Which license subscription terms are available for AMP licensing?
A. 1 month 3 months 6 months
B. 1 year. 5 years. 10 years
C. 5 years 10 years 30 years
D. 1 year. 3 years. 6 years
How does AMP's device trajectory capabilities help address customer s issues?
A. It determines the scope and cause of an outbreak and tracks suspicious files
B. It searches for potential threats based on identified activities and behaviors
C. It isolates suspicious files and runs them in a sandbox environment to determine their authenticity
D. It analyses the data from suspicious files to provide a new level of threat intelligence
Which two options are attack vectors protected by Identity and Access Control? (Choose two.)
A. Backups
B. Mobile
C. Endpoints
D. Cloud apps
E. Voicemail
Which three features provided by NGFW and NGIPS support the Internet Edge' use case? (Choose three.)
A. Supports High Availability
B. Support for profiling devices
C. Supports dynamic routing protocols such as OSPF or BGP
D. Support for Platform exchange grid
E. Support for High Bandwith environments
F. Support for integrated posture assessment
Which options Cisco solutions are coveredenable customer's businesses?
A. Enhancing remediation operations
B. Having the fastest threat identification
C. Automating the security intelligence updates
D. Their ability to keep customers networks more secure and make IT more productive
Which are three key features of DNS-layer security? (Choose three.)
A. Data Loss Prevention
B. Retrospective Analysis
C. Real-time sandboxing
D. Provides visibility into all Internet activity
E. Acts as first level of protection by providing security at DNS layer
F. Resolves all DNS request through a single recursive DNS service
Which are two main features of DDoS Attack Prevention? (Choose two)
A. Block or allow traffic automatically
B. Redirects DDoS traffic back to attacker
C. Leveraging AMP ThreatGrid technology
D. Stop attacks within seconds of detection
What is key feature of Cognitive Threat Analytics?
A. It enables safe email usage with event Analytics
B. It improves threat detection over time with machine learning
C. It enhances anonymity with URL filtering
D. It enables greater endpoint device profiling intelligence with entity modeling
Which feature of ISE is Terminal Access Control System (TACACS) a part of?
A. Device Administration
B. Device Profiling
C. Centralized policy management
D. Guest access management
Which are two main features of ASAv and NGFWv? (Choose two.)
A. File trajectory
B. API-based management
C. File reputation
D. Agile provisioning
Which Cisco solution falls under cloud security?
A. Umbrella
B. Identity Services Engine
C. Firepower Threat Defense
D. Cisco Defense Orchestrator
How many web requests does Talos process per month?
A. 1.5 million
B. 100,000
C. 130 billion
D. 130 million
Which three malware categories does real-time Malware Scanning protect you from? (Choose three)
A. Antivirus Monitoring
B. Adware
C. Trojan Downloader
D. Outbreak Filters
E. Web Reputation
F. Phishing URL
Which feature of E-mail Security protects users from virus outbreaks using the Tabs database to quarantine suspicious messages?
A. Antivirus defense
B. Outbreak fitters
C. Data Loss Prevention
D. Advanced Malware Protection
What are two main features of enabling Cloudlock in a customer's environment? (Choose two) A. Cloudlock connects via Oauth
B. Cloud App security works on plug-in
C. Easily creates network lags for different users
D. It takes less than five minutes to enable per platform
E. Protects against cloud-native malware