Which two attack vectors are protected by Malware Protection? (Choose Two)

Which two attack vectors are protected by Malware Protection? (Choose Two)A . EmailB . MobileC . VoicemailD . Data CenterE . WebView AnswerAnswer: A,B

March 7, 2021 No Comments READ MORE +

What are the competing IT and Operation Technology (OT) priorities that make securing loT difficult?

What are the competing IT and Operation Technology (OT) priorities that make securing loT difficult?A . Security vSB . availabilityC . Malfunctions vs. outputD . Innovation vs. manufacturingE . Hackers vs. safetyView AnswerAnswer: A

March 7, 2021 No Comments READ MORE +

In the Local Data Center Edge use case, which capabilities are provided by NGFW & NGIPS?

In the Local Data Center Edge use case, which capabilities are provided by NGFW & NGIPS?A . Identity Services EngineB . Reduced attack surface of the on-premises datacenterC . Platform exchange gridD . File Retrospection and TrajectoryView AnswerAnswer: B

March 7, 2021 No Comments READ MORE +

Which two features are part of Cisco Web security? (Choose Two)

Which two features are part of Cisco Web security? (Choose Two)A . user authenticationB . device profling and onboardingC . intrusion preventionD . user identity trackingE . URL fiteing&dynamic content analysisView AnswerAnswer: C,E

March 7, 2021 No Comments READ MORE +

What percent of threats did ASA with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?

What percent of threats did ASA with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?A . 95.6%B . 99.2%C . 98.5%D . 100%View AnswerAnswer: D

March 7, 2021 No Comments READ MORE +

What is used to reduce attack surfaces?

What is used to reduce attack surfaces?A . RemediationB . SegmentationC . Device trustD . AccessView AnswerAnswer: B

March 7, 2021 No Comments READ MORE +

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose Two)

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose Two)A . access to multiple data layersB . threats stopped from getting in and spreadingC . access to Trojan downloaderD . security enforced at the DNS layerE . see and share malware detailsView AnswerAnswer: B,E

March 6, 2021 No Comments READ MORE +

Which two security areas are part of Cisco's endpoint solutions? (Choose two)

Which two security areas are part of Cisco's endpoint solutions? (Choose two)A . Identity & Access ControlB . URL FilteringC . Remote VPND . Cloud App SecurityE . Malware ProtectionView AnswerAnswer: A,E

March 6, 2021 No Comments READ MORE +

What are two reasons why perimeter-based network security is no longer sufficient? (Choose Two)

What are two reasons why perimeter-based network security is no longer sufficient? (Choose Two)A . More usersB . More IT professionalsC . More devicesD . More networksE . More vulnerabilitiesView AnswerAnswer: A,C

March 5, 2021 No Comments READ MORE +

Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?

Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?A . advanced threat protection and rapid remediationB . security automationC . global threat intelligenceD . contextual awarenessView AnswerAnswer: D

March 5, 2021 No Comments READ MORE +