Which three options are products and benefits of the mobile threat-centric solution? (Choose three.)
Which three options are products and benefits of the mobile threat-centric solution? (Choose three.)A . AnyConnectB . URL filteringC . enhanced access and usage control with ISED . enforced device security policies with MerakiE . secure off-network connection with Stealth watchF . CRD and Network AnalyticsView AnswerAnswer: CDE Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_00.html...
Which two options are products and benefit of the campus and branch threat-centric solutions? (choose two)
Which two options are products and benefit of the campus and branch threat-centric solutions? (choose two)A . Trojan and malware protection with NGIPSB . Enhanced zero-day and DDoS attacks through NGFWC . Cloud security policy management through CDOD . Fuzzy fingerprintE . Trusted securityView AnswerAnswer: AB
Which customer cost saver has examples like centralized management and automatic updates?A . flexible licensingB . less time scoping a breachC . faster integrationD . fewer resources to manageView AnswerAnswer: A
Which attribute does Cisco Talos possess?A . ability to detect threats across all layers of defenseB . third-party applications integrated through comprehensive APIsC . real-time threat intelligenceD . detection of threats communicated within 24 hours of occurrenceE . blocks threats in real timeView AnswerAnswer: C
How does the Cisco policy and access solution handle a changing user base in a growing company?A . Cisco delivers a flexible and scalable security solution framework that can adapt to changing customer needs.B . Cisco architecture offers the lowsest TOC by providing products that integrate, which lower the cost...
Which two attack vectors are protected by NGIPS? (Choose two.)A . cloud appsB . data centerC . voicemailD . emailE . campus and branchView AnswerAnswer: BE Explanation: https://www.cisco.com/c/en/us/products/security/ngips/index.html#~stickynav=3
Which three options are web and email security products? (Choose three.)A . UmbrellaB . CloudlockC . Web Security ApplianceD . InvestigateE . NGFWF . MerakiView AnswerAnswer: ABE
Which two attack vectors are protected by identity and access control? (Choose two.)A . campus and homeB . voicemailC . endpointsD . data centerE . cloud appsView AnswerAnswer: AD
Which two options are products in the cloud apps threat-centric solution? (Choose two.)A . TalosB . StealthwatchC . CloudlockD . ISEE . MerakiView AnswerAnswer: AC
Which three options are Cisco Advanced Threat Solutions? (Choose three.)A . Next-Generation Intrusion Prevention SystemB . StealthwatchC . remote access VPND . identity and access controlE . web securityF . cognitive Threat analyticsView AnswerAnswer: ADF