Which feature of ISE provides role-based access control and command level authorization with logging for auditing
Which feature of ISE provides role-based access control and command level authorization with logging for auditingA . Centralized policy managementB . TACACS+ Device AdministrationC . Context-aware accessD . Platform exchange gridView AnswerAnswer: B
Which two attack vectors are protected by Web Security? (Choose two.)
Which two attack vectors are protected by Web Security? (Choose two.)A . CloudB . EmailC . VoicemailD . WebE . Data CenterView AnswerAnswer: AD
What does remote access use to verify identity?
What does remote access use to verify identity?A . Remote Access VPNB . AgentsC . MFAD . AMP for EndpointsView AnswerAnswer: A
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?A . Trust modelingB . Anomaly detectionC . Event classificationD . Anomaly modelingView AnswerAnswer: B
What are two solutions Cisco offers for web security? (Choose two.)
What are two solutions Cisco offers for web security? (Choose two.)A . Cloud lockB . NG FWC . CRESD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: DE
Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?
Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?A . Differentiated Mobile AccessB . Secure Layer 2 Network AccessC . Trusted Network DetectionD . Network Visibility ModuleView AnswerAnswer: D
Which statement best embodies trust-centric security?
Which statement best embodies trust-centric security?A . Protect users from attacks by enabling strict security policies.B . Verify before granting access via identity-based policies for users, devices, apps, and locations.C . Verify before granting access via MDM software.D . Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate.View...
Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)
Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)A . Behavioral Indication of CompromiseB . File Retrospection and TrajectoryC . Mobile AccessD . Remote Access VPNE . Network AnalyticsView AnswerAnswer: DE
Which two attack vectors are protected by Cloud Security? (Choose two.)
Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . EmailC . CloudD . WebE . Data CenterView AnswerAnswer: BC
What percent of threats did AS A with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?
What percent of threats did AS A with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?A . 95.6%B . 98.5%C . 100%D . 99.2%View AnswerAnswer: C