Which two security risks are created by legacy approaches to networking? (Choose two.)

Which two security risks are created by legacy approaches to networking? (Choose two.)A . slow containmentB . access pointsC . large attack surfaceD . network downtimeE . user vulnerabilityView AnswerAnswer: AC

January 24, 2021 No Comments READ MORE +

Which two loT environment layers are protected by Stealth watch? (Choose two.)

Which two loT environment layers are protected by Stealth watch? (Choose two.)A . Internet/CloudB . Access PointsC . EndpointsD . ThingsE . Control LayerView AnswerAnswer: DE

January 23, 2021 No Comments READ MORE +

What is used to reduce attack surfaces?

What is used to reduce attack surfaces?A . RemediationB . SegmentationC . AccessD . Device trustView AnswerAnswer: D

January 23, 2021 No Comments READ MORE +

What are two solutions Cisco offers for email security? (Choose two.)

What are two solutions Cisco offers for email security? (Choose two.)A . MerakiB . Cloud lockC . UmbrellaD . AMP for Email SecurityE . TetrationView AnswerAnswer: CD

January 22, 2021 No Comments READ MORE +

Which two attack vectors are protected by Cloud Security? (Choose two.)

Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . EmailC . CloudD . WebE . Data CenterView AnswerAnswer: CD

January 21, 2021 No Comments READ MORE +

What are two common seller obstacles? (Choose two.)

What are two common seller obstacles? (Choose two.)A . Unresponsive potential customersB . Overcrowded portfoliosC . Fragmented solutionsD . Complexity of solution componentsE . Seller competitionView AnswerAnswer: CD

January 20, 2021 No Comments READ MORE +

What does remote access use to verify identity?

What does remote access use to verify identity?A . Remote Access VPNB . AgentsC . MFAD . AMP for EndpointsView AnswerAnswer: A

January 18, 2021 No Comments READ MORE +

What feature of web security filters websites based on who, what, where, how, and when to assign a website a score?

What feature of web security filters websites based on who, what, where, how, and when to assign a website a score?A . Reputation FilteringB . Malware FilteringC . URL AnalyticsD . Sandbox FilteringView AnswerAnswer: A

January 18, 2021 No Comments READ MORE +

Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?

Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?A . Trust modelingB . Anomaly detectionC . Event classificationD . Anomaly modelingView AnswerAnswer: B

January 18, 2021 No Comments READ MORE +

Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)

Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)A . Behavioral Indication of CompromiseB . File Retrospection and TrajectoryC . Mobile AccessD . Remote Access VPNE . Network AnalyticsView AnswerAnswer: DE

January 17, 2021 No Comments READ MORE +