What are three security blind spots that must be addressed? (Choose three.)
AWorkloads
BData
CNetworks
DIT
EApplications
FEmail
Which two areas require secure access? (Choose two.)
AWorktable
BWorkspace
CWorkloads
DWorkforce
EWorkflow
What does remote access use to verify identity?
AAgents
BMFA
CRemote Access VPN
DAMP for Endpoints
Which two Cisco products help manage data access policy consistently? (Choose two.)
AStealthwatch
BpxGrid
CDuo
DAMP for Endpoints
ECloudlock
Which two attack vectors are protected by Web Security? (Choose two.)
AWeb
BCloud
CVoicemail
DData Center
EEmail
What is one of the key features of Cognitive Intelligence?
AAllows visibility into anonymous and encrypted communications
BIt enables greater threat intelligence with entity modeling
CIt enables safe email usage with event analytics
DIt enhances anonymity with URL filtering
What are two common customer obstacles? (Choose two.)
ACompliance regulations
BSecurity system blackouts
CHigh turnover of IT professionals
DLimited resources
ELack of solution integration
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)
ADuo
BCisco Security Connector
CIndustrial Network Director
DIdentity Services Engine
EAdvanced Malware Protection
What are two solutions for Cisco Cloud Security? (Choose two.)
Acloud data security
Bintrusion prevention
Cadvanced network security
Dcloud-delivered security
Ecloud security
What are three main solutions areas for Advanced Threat? (Choose three.)
ANGFW
BNetwork Analytics
CIntrusion Analytics
DThreat Analytics
EMalware Protection
FThreat Defense
What are two tenants of establishing an SD-perimeter? (Choose two.)
ASecuring device access
BSecuring network access
CSecuring user-device trust
DSecuring app access
ESecuring endpoints
On average, how many days elapse before businesses discover that they have been hacked?
A50
B30
C10
D70
What are two core functionalities of DNS-layer security? (Choose two.)
ALive threat intelligence
BProxy and file inspection
CURL filtering
DReal-time sandboxing
EData analytics and monitoring
What are three key benefits of Cisco NGFW? (Choose three.)
AReduces throughput
BIncreases traffic latency
CDetects and remediates threats faster
DIdentifies anomalous traffic
EPrepares defenses
FReduces complexity
What are two steps organizations must take to secure IoT? (Choose two.)
Ablock contractors
Bprevent blackouts
Cacquire subscription solutions
Dremediate malfunctions
Eupdate equipment
Which two IoT environment layers are protected by ISE? (Choose two.)
AEndpoints
BAccess Points
CControl Layer
DThings
EInternet/Cloud
Which two elements does Advanced Malware Protection provide? (Choose two.)
Adynamic data analysis
Bintrusion analysis
Cdynamic URL filtering
Dreputation analytics
Eadvanced analytics
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)
Aaccess to multiple data layers
Bthreats stopped from getting in and spreading
Csee and share malware details
Daccess to Trojan downloader
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?
ATelemetry, shared intelligence, and profiling sources
BContext, telemetry and intelligence sources
CIntelligence sources, telemetry, and shared intelligence
DContext, telemetry, and profiling sources
Which two attack vendors are protected by Visibility and Enforcement? (Choose two.)
AWeb
BCloud
CEndpoints
DEmail
EMobile
Which two attack vectors are protected by MFA? (Choose two.)
AMobile
BCloud
CData center
DWeb
EEndpoints
Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)
ANetwork Analytics
BBehavioral Indication of Compromise
CRemote Access VPN
DFile Retrospection and Trajectory
EMobile Access
What are two result of utilizing a fragmented security model? (Choose two.)
AReduced malicious file risk through additional segmentation.
BDecreased network accessibility through multiple applications.
CDecreased visibility and limited understand of security coverage.
DIncreased identity controls
EIndividual components pieced together to meet requirements.
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)
AMore users
BMore devices
CMore networks
DMore IT professionals
EMore vulnerabilities
What are two key advantages of Cisco's Security Solutions Portfolio? (Choose two.)
AAn effective security solution portfolio can help customers overcome ever-growing security challenges
BCisco Security provides direct, simple, and balanced detection by driving customer outcomes
CCisco Security provides flexible, simple, and integrated advanced threat detection, through a multilayered approach.
DThe Cisco Security Portfolio offers realtime access control and event monitoring to drive business outcomes.
EThe Cisco Security Portfolio provides security across the entire business environment.