Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?
A. Device profiting and onboarding
B. Role and device segmentation
C. Guest Access
D. Secure remote access
What are two key points of the Cisco Security and Threat Landscape module? (Choose two.)
A. The Cisco Security Solutions Portfolio drives customer business outcomes by providing threat-centric defense, visibility and control, and flexible solutions
B. The threat landscape is expanding, becoming more complex, and threats are increasingly costing more to customers
C. The Cisco Security Solutions Portfolio stops all threat from entering a customers network.
D. Customers need several solutions to protect their environment.
Which is a feature of E-mail Security?
A. Layer-4 Monitoring
B. Umbrella
C. Outbreak Filters
D. Investigate
Which two products are part of Cisco's Data Center threat-centric solution? (Choose two.)
A. Rapid threat detection through NGFW and NGFWv
B. Enforced device security with Meraki
C. URL filtering
D. Relationship segmentation
E. Automated policy enforcement with ASAv
Which feature in the DNS security module provide on and off network DNS protection?
A. Umbrella
B. Layer-4 monitoring
C. Real-time sandboxing
D. Data Loss Prevention
Which are two main features of Intrusion Prevention? (Choose two.)
A. Threat analysis through network behavior analysis
B. Protecting against Zero-Day attacks
C. Layer-4 traffic monitoring across platforms
D. Vulnerability-based threat management
Which AMP feature is provided by fuzzy fingerprinting?
A. Identifies specific instances of malware with a signature-based approach
B. Automatically detects polymorphic variants of known malware
C. Provides recursive DNS lookup services
D. Identifies new malware using statistical modeling and analytics engines
Employee-sponsored network access, guest access, and activity tracking are contributors to which feature of ISE?
A. Device profiting
B. Context-aware access
C. Guest access management
D. Platform exchange grid
Which feature of ISE is Terminal Access Control System (TACACS) a part of?
A. Device Administration
B. Device Profiling
C. Centralized policy management
D. Guest access management
Which are two main challenges of securing web and e-mail? (Choose two.)
A. Cyber Crime is a growing industry
B. Securing cloud apps
C. Protecting against data centers
D. 90% of cyber criminals use DNS in attacks