Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which Cisco solution falls under Advanced Threat?

A.

Umbrella

B.

Identity Services Engine

C.

Stealthwatch

D.

Threat Grid

Full Access
Question # 5

Which Cisco product included in the Endpoint threat-centric solution?

A.

Umbrella

B.

ASAv

C.

Meraki MX

D.

Cloudlock

Full Access
Question # 6

Which two features are provided by ISE? (Choose two.)

A.

DDoS attack prevention

B.

Retrospective Security

C.

Centralized policy management

D.

Device Firewalling

E.

Context-aware Access

Full Access
Question # 7

What are three main challenges addressed by Cisco’s cloud delivered securit y solutions? (Choose three.)

A.

Threats are becoming too advanced for traditional hardware

B.

Solutions often require frequent hardware updates

C.

Employees are unable to work remotely

D.

Businesses are using email too frequently

E.

Frequently installing new servers, appliances, and devices adds to the maintenance workload

F.

IT staff must continuously grow with a dditional specializations to address the solutions

Full Access
Question # 8

Which options describes how Cisco solutions enable customer ’s businesses?

A.

Enhancing remediation operations

B.

Having the fastest threat identification

C.

Automating the security intelligence updates

D.

Their ability to keep customers networks more secure and make IT more productive.

Full Access
Question # 9

Which feature of E-mail Security protects users from virus out breaks using the Talos database to quarantine suspicious messages?

A.

Antivirus defense

B.

Outbreak filters

C.

Data Loss Prevention

D.

Advanced Malware Protection

Full Access
Question # 10

Which three options does Cisco provide customers in terms of “Visibility and Control” against today’s threats? (Choose three.)

A.

Granular device visibility and management

B.

Unparalleled network a nd endpoint visibility

C.

18-month device release cycle

D.

Bandwith Utilization Monitoring

E.

Comprehensive policy enforcement

F.

Fast device policy updates

Full Access
Question # 11

Which StealthWatch device monitors, analyzes, separates, categorizes, and stores information from, allowing it to create a baseline of type expected network activity?

A.

Forensic investigation

B.

Advanced malware protection

C.

Malware clustering

D.

Flow collector

Full Access
Question # 12

Which are two main features of ASAv and NGFWv? (Choose two.)

A.

File trajectory

B.

API-based management

C.

File reputation

D.

Agile provisioning

Full Access
Question # 13

Which t hree options are attack vectors protected by Web Security? (Choose three.)

A.

Endpoints

B.

Mobile

C.

Offline Devices

D.

Backups

E.

Voicemail

F.

Web

Full Access