Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?

Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?A . Differentiated Mobile AccessB . Secure Layer 2 Network AccessC . Trusted Network DetectionD . Network Visibility ModuleView AnswerAnswer: D

January 14, 2021 No Comments READ MORE +

What percent of threats did AS A with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?

What percent of threats did AS A with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?A . 95.6%B . 98.5%C . 100%D . 99.2%View AnswerAnswer: C

January 14, 2021 No Comments READ MORE +

Which two products empower customers to create secure next-gen networks? (Choose two.)

Which two products empower customers to create secure next-gen networks? (Choose two.)A . ACIB . SD-AccessC . AMPD . MFAE . IS EView AnswerAnswer: CE

January 14, 2021 No Comments READ MORE +

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Differentiated Mobile AccessB . Flexible AAA OptionsC . Identity Services EngineD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D

January 13, 2021 No Comments READ MORE +

Which statement best embodies trust-centric security?

Which statement best embodies trust-centric security?A . Protect users from attacks by enabling strict security policies.B . Verify before granting access via identity-based policies for users, devices, apps, and locations.C . Verify before granting access via MDM software.D . Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate.View...

January 13, 2021 No Comments READ MORE +

Which two security risks are created by legacy approaches to networking? (Choose two.)

Which two security risks are created by legacy approaches to networking? (Choose two.)A . slow containmentB . access pointsC . large attack surfaceD . network downtimeE . user vulnerabilityView AnswerAnswer: AC

December 27, 2020 No Comments READ MORE +

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)A . limited access pointsB . secure remote accessC . segmentation & visibilityD . cross-architecture automationE . network analysisView AnswerAnswer: BC

December 27, 2020 No Comments READ MORE +

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Differentiated Mobile AccessB . Flexible AAA OptionsC . Identity Services EngineD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D

December 27, 2020 No Comments READ MORE +

What are three major features of Stealth Watch? (Choose three.)

What are three major features of Stealth Watch? (Choose three.)A . NetFlow monitoringB . Data Loss PreventionC . Threat-based anomaly detectionD . Forensic investigationE . Realtime sandboxingF . Malware clusteringView AnswerAnswer: AEC

December 27, 2020 No Comments READ MORE +

What is an attribute of Cisco Talos?

What is an attribute of Cisco Talos?A . Detection of threats communicated within 48 hours of occurrenceB . 3 rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Real-time threat informationView AnswerAnswer: D

December 24, 2020 No Comments READ MORE +