Which two attack vectors are protected by NGFW? (Choose two.)
A. Web
B. Cloud
C. Mobile
D. Data Center
E. Email
Which are two reasons perimeter-based network security is no longer sufficient? (Choose two )
A. more vulnerabilities
B. more IT professionals
C. more networks
D. more devices
E. more users
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
A. Expanding complexity
B. Growing ecosystem
C. Decreasing endpoint ecosystem
D. Decreasing 3rd party applications
E. Decreased access points
Which three products are in Cisco's Web and Email Security portfolio? (Choose three.)
A. Meraki
B. ESA
C. Investigate
D. WSA
E. Umbrella
F. CES
What does remote access use to verify identity?
A. MFA
B. Remote Access VPN
C. Agents
D. AMP for Endpoints
Which statement embodies trust-centric security?
A. Verify before granting access via MDM software
B. Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate
C. Protect users from attacks by enabling strict security policies.
D. Verify before granting access via identity-based policies for users, devices, apps. and locations
Which component of StealthWatch uses sophisticated security analytics to accelerate threat response times?
A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection
What are two ways that Cisco helps customers balance protection and accessibility? (Choose two )
A. Leverage integrated tools and dynamic context to enforce policies
B. Reinforce device infrastructure with an extensive security portfolio
C. Provide vital training to ensure a skilled workforce.
D. Analyze user and device vulnerability.
E. Manage risk more effectively across the environment.
Which two types of recurring revenue sales does Cisco offer? (Choose two.)
A. Platform subscription sale
B. License sale
C. Portfolio
D. Subscription sale
E. Training
Which two attack vectors are protected by Visibility and Enforcement? (Choose two.)
A. Mobile
B. Cloud
C. Email
D. Web E. Endpoints
Which two attack vectors are protected by Email Security? (Choose two.)
A. Voicemail
B. Mobile
C. Email
D. Web
E. Cloud
What is used to reduce attack surfaces?
A. Access
B. Remediation
C. Segmentation
D. Device trust
Which two aspects of Cisco solutions save customers money? (Choose two.)
A. fewer resources to manage
B. faster integration
C. replacing current infrastructure completely
D. 100% effectiveness
Which Cisco Security benefit is a differentiator that allows partners to plan and model their business?
A. one solution to fit every need
B. comprehensive vision for security
C. unparalleled commitment
D. best-in-class technologies
Which Cisco value is demonstrated by the fact that Cisco advanced threat solutions block emerging and persisting threats quickly?
A. protection
B. agility
C. time-to-value
D. scalability