Which is a key feature of Cisco Defense Orchestra?

Which is a key feature of Cisco Defense Orchestra?A . Profiles devices connected to customer s networkB . Orchestrates security policy management form one placeC . Consolidates configuration managementD . Protects customers network against zero-day attacksView AnswerAnswer: B

January 12, 2019 No Comments READ MORE +

Which feature of CTA can separate statistically normal traffic form anomalous traffic?

Which feature of CTA can separate statistically normal traffic form anomalous traffic?A . URL filteringB . Trust modelingC . Anomaly detectionD . Event classificationView AnswerAnswer: C

January 6, 2019 No Comments READ MORE +

Which is a key feature that Advanced Malware Protection provides?

Which is a key feature that Advanced Malware Protection provides?A . Dynamic Content AnalysisB . Reputation AnalyticsC . Retrospective SecurityD . Dynamic URL FilteringView AnswerAnswer: A

December 28, 2018 No Comments READ MORE +

Which feature of ISE is Terminal Access Control System (TACACS) a part of?

Which feature of ISE is Terminal Access Control System (TACACS) a part of?A . Device AdministrationB . Device ProfilingC . Centralized policy managementD . Guest access managementView AnswerAnswer: A

December 26, 2018 No Comments READ MORE +

What two challenges do customers (ace in their Campus and Branch deployments? (Choose two)

What two challenges do customers (ace in their Campus and Branch deployments? (Choose two)A . Securing the entire infrastructureB . Stopping data breaches across campuses and branchesC . Protect data across multiple cloud applicationsD . Monitoring file behavior across a large set of endpointsE . Understanding what our users a*e...

December 23, 2018 No Comments READ MORE +

Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?

Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?A . Centralized policy managementB . Context-aware accessC . Patch managementD . Platform exchange gridView AnswerAnswer: B

December 18, 2018 No Comments READ MORE +

Which feature of AnyConnect provides you the ability to identify data breaches as they happen?

Which feature of AnyConnect provides you the ability to identify data breaches as they happen?A . Flexible AAA OptionsB . Network Visibility ModuleC . Differentiated Mobile AccessD . Trusted Network DetectionView AnswerAnswer: B

December 16, 2018 No Comments READ MORE +

How many web requests does Talos process per month?

How many web requests does Talos process per month?A . 1.5 millionB . 100,000C . 130 billionD . 130 millionView AnswerAnswer: C

December 15, 2018 No Comments READ MORE +

Which is a key feature that Advanced Malware Protection provides?

Which is a key feature that Advanced Malware Protection provides?A . Dynamic Content AnalysisB . Reputation AnalyticsC . Retrospective SecurityD . Dynamic URL FilteringView AnswerAnswer: A

December 12, 2018 No Comments READ MORE +

Which Policy and Access solution technology combines posture checks and authentication across wired, wireless, and VPN networks?

Which Policy and Access solution technology combines posture checks and authentication across wired, wireless, and VPN networks?A . Cisco AnyConnectB . Next Generation Intrusion Prevention SystemC . Cisco StealthwatchD . ASA 2100 seriesView AnswerAnswer: A

December 11, 2018 No Comments READ MORE +