Which two attack vectors are protected by Remote Access VPN? (Choose two.)
Which two attack vectors are protected by Remote Access VPN? (Choose two.)A . CloudB . Campus & BranchC . VoicemailD . MobileE . EmailView AnswerAnswer: D B
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . DuoB . Identity Services EngineC . StealthwatchD . Cisco Security ConnectorE . AMP for EndpointsView AnswerAnswer: B E Explanation: https://www.cisco.com/c/en_ae/products/security/portfolio.html#~stickynav=2
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
In which two ways has digitization transformed today's security threat landscape? (Choose two.)A . Expanding complexityB . Growing ecosystemC . Decreasing endpoint ecosystemD . Decreasing 3rd party applicationsE . Decreased access pointsView AnswerAnswer: CD
What does remote access use to verify identity?
What does remote access use to verify identity?A . MFAB . Remote Access VPNC . AgentsD . AMP for EndpointsView AnswerAnswer: B
What are two ways Cisco addresses customers' growing business needs? (Choose two.)
What are two ways Cisco addresses customers' growing business needs? (Choose two.)A . Multi/hybrid cloud platformsB . Highly-scalable DC platformsC . Bulletproof NGFW appliancesD . Consolidated tracking and reportingE . Multiple solution deployment choicesView AnswerAnswer: A E
Which component of AMP provides the details customers need to address problems after a breach is identified?
Which component of AMP provides the details customers need to address problems after a breach is identified?A . Rapid remediationB . FilesandboxmgC . Continuous analysisD . Context awarenessView AnswerAnswer: C
Which three factors should a customer consider when choosing the ideal security solution provider? (Choose three.)
Which three factors should a customer consider when choosing the ideal security solution provider? (Choose three.)A . Creates new market opportunitiesB . Delivers excellent partner and customer supportC . Generates higher margins on each saleD . Provides solutions at the lowest costE . Offers more than just niche productsF ....
Which two attack vectors are protected by NGFW? (Choose two.)
Which two attack vectors are protected by NGFW? (Choose two.)A . WebB . CloudC . MobileD . Data CenterE . EmailView AnswerAnswer: ED
Which two benefits of flexible purchasing does Cisco provide? (Choose two.)
Which two benefits of flexible purchasing does Cisco provide? (Choose two.)A . Simplify the datacenterB . Meet immediate needsC . Roll out more solutionsD . Plan for the futureE . Reduce training needsView AnswerAnswer: CD
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)A . Limit internal access to networks.B . Require and install agents on mobile devices.C . Always verify and never trust everything inside and outside the perimeter.D . Block BYOD devices.E . Only grant access...