For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)A . Windows service B. computer identity C. user identity D. Windows firewall E. default browserView AnswerAnswer: A,D
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?A . RBAC B. ETHOS detection engine C. SPERO detection engine D. TETRA detection engineView AnswerAnswer: B
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?A . SNMP B. SMTP C. syslog D. model-driven telemetryView AnswerAnswer: D Explanation: Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of service B. time synchronization C. network address translations D. intrusion policyView AnswerAnswer: B
Which tool should be used to accomplish this goal?
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?A . Security Manager B. Cloudlock C. Web Security Appliance D. Cisco ISEView...
What is the result of this Python script of the Cisco DNA Center API?
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds authentication to a switch B. adds a switch to Cisco DNA Center C. receives information about a switch D. deletes a switch from Cisco DNA CenterView AnswerAnswer: B
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . exploits B. ARP spoofing C. denial-of-service attacks D. malware E. eavesdroppingView AnswerAnswer: A,D Explanation: Malware means “malicious software”, is any software intentionally designed to cause damage to a...
Which benefit does endpoint security provide the overall security posture of an organization?
Which benefit does endpoint security provide the overall security posture of an organization?A . It streamlines the incident response process to automatically perform digital forensics on the endpoint. B. It allows the organization to mitigate web-based attacks as long as the user is active in the domain. C. It allows...
Which API is used for Content Security?
Which API is used for Content Security?A . NX-OS API B. IOS XR API C. OpenVuln API D. AsyncOS APIView AnswerAnswer: D
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
An MDM provides which two advantages to an organization with regards to device management? (Choose two)A . asset inventory management B. allowed application management C. Active Directory group policy management D. network device management E. critical device managementView AnswerAnswer: A,B