Which two security risks are created by legacy approaches to networking? (Choose two.)
Which two security risks are created by legacy approaches to networking? (Choose two.)A . slow containmentB . access pointsC . large attack surfaceD . network downtimeE . user vulnerabilityView AnswerAnswer: AC
Which two loT environment layers are protected by Stealth watch? (Choose two.)
Which two loT environment layers are protected by Stealth watch? (Choose two.)A . Internet/CloudB . Access PointsC . EndpointsD . ThingsE . Control LayerView AnswerAnswer: DE
What is used to reduce attack surfaces?
What is used to reduce attack surfaces?A . RemediationB . SegmentationC . AccessD . Device trustView AnswerAnswer: D
What are two solutions Cisco offers for email security? (Choose two.)
What are two solutions Cisco offers for email security? (Choose two.)A . MerakiB . Cloud lockC . UmbrellaD . AMP for Email SecurityE . TetrationView AnswerAnswer: CD
Which two attack vectors are protected by Cloud Security? (Choose two.)
Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . EmailC . CloudD . WebE . Data CenterView AnswerAnswer: CD
What are two common seller obstacles? (Choose two.)
What are two common seller obstacles? (Choose two.)A . Unresponsive potential customersB . Overcrowded portfoliosC . Fragmented solutionsD . Complexity of solution componentsE . Seller competitionView AnswerAnswer: CD
What does remote access use to verify identity?
What does remote access use to verify identity?A . Remote Access VPNB . AgentsC . MFAD . AMP for EndpointsView AnswerAnswer: A
What feature of web security filters websites based on who, what, where, how, and when to assign a website a score?
What feature of web security filters websites based on who, what, where, how, and when to assign a website a score?A . Reputation FilteringB . Malware FilteringC . URL AnalyticsD . Sandbox FilteringView AnswerAnswer: A
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?A . Trust modelingB . Anomaly detectionC . Event classificationD . Anomaly modelingView AnswerAnswer: B
Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)
Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)A . Behavioral Indication of CompromiseB . File Retrospection and TrajectoryC . Mobile AccessD . Remote Access VPNE . Network AnalyticsView AnswerAnswer: DE