What are two key advantages of Cisco's Security Solutions Portfolio? (Choose two.)
A. Cisco Security provides flexible, simple, and integrated advanced threat detection, through a multilayered approach.
B. The Cisco Security Portfolio offers realtime access control and event monitoring to drive business outcomes.
C. The Cisco Security Portfolio provides security across the entire business environment.
D. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes.
E. An effective security solution portfolio can help customers overcome ever-growing security challenges.
Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?
A. Network Visibility Module
B. Trusted Network Detection
C. Differentiated Mobile Access
D. Secure Layer 2 Network Access
What does TrustSec assign to the user or device traffic at ingress that enforces the access policy based on the tag in the infrastructure?
A. Ingress VLAN
B. Access Control List
C. Security Group Tag
D. VXLAN
Which too products are involved in discovering classifying and verifying profiles? (Choose Two)
A. Industrial Network Director
B. Duo
C. Cisco Security Connector
D. Advanced Malware Protection
E. Identity Services Engine
Which two products are involved in granting safe access to apps? (Choose Two)
A. TrustSec
B. ISE
C. SD-Access
D. Duo
E. ACI
Which two attack vectors are protected by MFA? (Choose Two)
A. Mobile
B. Endpoints
C. Data center
D. Web
E. Cloud
Which two loT environment layers are protected by AMP for Endpoints? (Choose Two)
A. Data Center
B. Internet/Cloud
C. Control Layer
D. Access Points
E. Things
What are two critical networking challenges? (Choose Two)
A. Access
B. Automation
C. Orchestation
D. Threat protection
E. Visibility
Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?
A. advanced threat protection and rapid remediation
B. security automation
C. global threat intelligence
D. contextual awareness
What is one of the reasons that customers need a Visibility and Enforcement solution?
A. Storage is moving from on-premises to cloud-based
B. Businesses can't see or protect devices on their network
C. Organizations need the ability to block high-risk websites
D. Network traffic is growing at an exponential rate
Which two loT environment layers are protected by Stealthwatch? (Choose Two) A. Things
B. Control Layer
C. Endpoints
D. Internet/Cloud
E. Access Points
Which two attack vectors are protected by Visibility and Enforcement? (Choose Two)
A. Mobile
B. Email
C. Web
D. Endpoints
E. Cloud
Which two products empower customers to create secure next-gen networks? (Choose Two)
A. ISE
B. AMP
C. ACI
D. SD-Access
E. MFA
Which Web Security feature allows employees to utilize web applications while also having the ability to bock or monitor problematic applications?
A. Realtime Application Sandboxing
B. Application Phishing
C. Application Visibility and Control
D. Layered Scanning and Control
Which two security areas are part of Cisco's endpoint solutions? (Choose two)
A. Identity and Access Control
B. URL Filtering
C. Remote VPN
D. Cloud App Security
E. Malware Protection