What two challenges do customers face in their Campus and Branch deployments? (Choose two)
AStopping data breaches across campuses and branches
BProtect data across multiple cloud applications
CMonitoring file behavior across a large set of endpoints
DUnderstanding what our users are doing online
ESecuring the entire infrastructure
How does AMP's device trajectory capabilities help address customer's issues?
AIt determines the scope and cause of an outbreak and tracks suspicious files
BIt searches for potential threats based on identified activities and behaviors
CIt isolates suspicious files and runs them in a sandbox environment to determine their authenticity
DIt analyzes the data from suspicious files to provide a new level of threat intelligence
Which three values are provided by NGFW and NGIPS in the "Campus NGFW" use case? (Choose three.)
ADynamic routing port to meet all network needs.
BDifferentiated Mobile Access
CAdditional firewalls across all platforms
DHigh throughput maintained while still protecting domain against threats
EIdentity Services Engine
FFlexible AAA Options
Which are three main elements of the Cloud App Security? (Choose three.)
ACloud Data Loss Prevention
BUser and Entity Behavior Analytics
CApps Firewall
DRapid Breach Remediation
EDNS 2-Layer Protection
FAnti-Spam Defense
Question 6
Security Architecture for Systems Engineer (SASE)
0
Question 7
Security Architecture for Systems Engineer (SASE)
Question 8
Security Architecture for Systems Engineer (SASE)
Question 9
Security Architecture for Systems Engineer (SASE)
Question 10
Security Architecture for Systems Engineer (SASE)
Question 11
Security Architecture for Systems Engineer (SASE)
Question 12
Security Architecture for Systems Engineer (SASE)
Question 13
Security Architecture for Systems Engineer (SASE)
Question 14
Security Architecture for Systems Engineer (SASE)
Question 15
Security Architecture for Systems Engineer (SASE)
Question 16
Security Architecture for Systems Engineer (SASE)
Question 17
Security Architecture for Systems Engineer (SASE)
Question 18
Security Architecture for Systems Engineer (SASE)
Question 19
Security Architecture for Systems Engineer (SASE)
Question 20
Security Architecture for Systems Engineer (SASE)
Question 21
Security Architecture for Systems Engineer (SASE)
Question 22
Security Architecture for Systems Engineer (SASE)
Question 23
Security Architecture for Systems Engineer (SASE)
Question 24
Security Architecture for Systems Engineer (SASE)
Question 25
Security Architecture for Systems Engineer (SASE)
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which Cisco Product is integrated with the AnyConnect Web Security Module?
ACisco Stealthwatch
BCisco Defense Orchestrator
CCisco Cloud Web Security
DCisco Email Security Appliance
What are three benefits that Cisco Umbrella brings to DNS-Layer Security? (Choose three.)
ABlocks Domains/IPs associated with malware, phising, etc
BDelivers cloud based recursive DNS
CProvides profiling of devices
DLogs all internet activity
EProvides Sandboxing of malware
FHelps provide breach mitigation
Which is a key feature that Advanced Malware Protection provides?
ADynamic Content Analysis
BReputation Analytics
CRetrospective Security
DDynamic URL Filtering
Which two options are attack vectors of the threat-centric defense? (Choose two)
AVoicemail
BBackups
CMobile
DVideo surveillance
ECloud apps
What are two key points of the Cisco Security and Threat Landscape module? (Choose two)
AThe Cisco Security Solutions Portfolio drives customer business outcomes by providing threat-centric defense, visibility and control, and flexible solutions
BThe threat landscape is expanding, becoming more complex, and threats are increasingly costing more to customers
CThe Cisco Security Solutions Portfolio stops all threats from entering a customer's network.
DCustomers need several solutions to protect their environment.
Which feature in the DNS security module provide on and off network DNS protection?
AUmbrella
BLayer-4 monitoring
CReal-time sandboxing
DData Loss Prevention
Which Cisco solution features recursive DNS capabilities?
AAnyconnect
BIdentity Services Engine
CUmbrella
DCognitive Threat Analytics
Employee-sponsored network access, guest access, and activity tracking are contributors to which feature of ISE?
ADevice profiling
BContext-aware access
CGuest access management
DPlatform exchange grid
What are two main features of enabling Cloudlock in a customer's environment? (Choose two)
ACloudlock connects via Oauth
BCloud App security works on plug-in
CEasily creates network tags for different users
DIt takes less than five minutes to enable per platform
EProtects against cloud-native malware
Which three malware categories does real-time Malware Scanning protect you from? (Choose three)
AAntivirus Monitoring
BAdware
CTrojan Downloader
DOutbreak Filters
EWeb Reputation
FPhishing URL
Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three)
APosture Assessment
BIntrusion Prevention
CEmail Security
DProfiling
ENext Generation Firewall
FCloud-Brokered VPN
Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags to edit networks dynamically rather than with VLANs?
ADevice profiling and onboarding
BRole and device segmentation
CGuest Access
DSecure remote access
Which three options are attack vectors protected by Web Security? (Choose three)
AEndpoints
BMobile
COffline Devices
DBackups
EVoicemail
FWeb
Which Cisco product is included in the Endpoint threat-centric solution?
AUmbrella
BASAv
CMeraki MX
DCloudlock
Which two Cisco products are a part of the "endpoints" threat-centric solution module? (Choose two)
ACisco Umbrella
BCisco Defense Orchestrator
CCisco VPN 3000
DCisco Stealthwatch
ECisco AMP for Endpoints
Which is a Cisco solution that features retrospective security?
AAMP for Endpoints
BCisco Defense Orchestrator
CUmbrella
DInvestigate
Which is a key feature of Cisco Defense Orchestra?
AOrchestrates security policy management form one place
BConsolidates configuration management
CProtects customers network against zero-day attacks
DProfiles devices connected to customer's network
Which AMP feature is provided by fuzzy fingerprinting?
AIdentifies specific instances of malware with a signature-based approach
BAutomatically detects polymorphic variants of known malware
CProvides recursive DNS lookup services
DIdentifies new malware using statistical modeling and analytics engines
Which feature of Cisco AnyConnect allows pre-login authentication using windows machines, or single sign-on user authentication using Windows logon credentials?
ASecure Layer-2 Network Access
BFlexible AAA Options
CDifferentiated Mobile Access
DTrusted Network Detection
Which are two main features of Advanced Malware Protection? (Choose two)
ALeverages Global Threat Intelligence to provide zero-day protection
BThreat protection across the entire attack continuum