Which two attack vectors are protected by NGFW? (Choose two.)
A. Web
B. Cloud
C. Mobile
D. Data Center
E. Email
Which two benefits of flexible purchasing does Cisco provide? (Choose two.)
A. Simplify the datacenter
B. Meet immediate needs
C. Roll out more solutions
D. Plan for the future
E. Reduce training needs
What are two ways Cisco addresses customers' growing business needs? (Choose two.)
A. Multi/hybrid cloud platforms
B. Highly-scalable DC platforms
C. Bulletproof NGFW appliances
D. Consolidated tracking and reporting
E. Multiple solution deployment choices
What are two common seller obstacles? (Choose two.)
A. Unresponsive potential customers
B. Overcrowded portfolios
C. Complexity of solution components
D. Fragmented solutions
E. Seller competition
Which two products empower customers to create secure next-gen networks? (Choose two.)
A. AMP
B. ISE
C. ACI
D. SD-Access
E. MFA
Where do you start to achieve true network visibility?
A. Branches
B. Fabric Level
C. OT
D. IT
Which two attack vectors are protected by Next-Generation Intrusion Prevention System (NGIPS)? (Choose two)
A. Cloud
B. Data Center
C. Corporate WAN
D. Endpoints
E. Email
Which two benefits of streamlined management does Cisco provide? (Choose two.)
A. Unified management across multiple services
B. Siloed systems
C. Consolidated security monitoring
D. Centralized management
E. Device access control
Which two elements does Tetration provide for security posture and traffic analysis? (Choose two.)
A. Device updates
B. App process information
C. App access control
D. App dependency map
E. Hardware packages
Which option is a challenge that is often faced by small businesses when considering security solutions?
A. Enterprise-level firewalls
B. Limited budget
C. Large numbers of overseas employees
D. Solutions that lack email security