What are three major features of StealthWatch? (Choose Three)
A. Malware clustering
B. Threat-based anomaly detection
C. Netflow monitoring
D. Data Loss Prevention
E. Realtime sandboxing
F. Forensic investigation
On average, how many days elapse before businesses discover that they have been hacked?
A. 10
B. 50
C. 30
D. 70
What are two key advantages of Cisco's Security Solutions Portfolio? (Choose two.)
A. Cisco Security provides flexible, simple, and integrated advanced threat detection, through a multilayered approach.
B. The Cisco Security Portfolio offers realtime access control and event monitoring to drive business outcomes.
C. The Cisco Security Portfolio provides security across the entire business environment.
D. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes.
E. An effective security solution portfolio can help customers overcome ever-growing security challenges.
What is a key feature of Duo?
A. Provides SSL VPN
B. Authenticates user identity for remote access
C. Automates policy creation for IT staff
D. Supports pxGrid
What are two core functionalities of DNS-layer security? (Choose Two)
A. URL filtering
B. Rea-time sandboxing
C. Proxy and file inspection
D. Live threat intelligence
E. Data analytics and monitoring
In the Campus NGFW use case, which capability is provided by NGFW and NGIPS?
A. Flexible AAA Options
B. Identity Services Engine
C. Differentiated Mobile Access
D. High throughput maintained while still protecting domains against threats
Which two attack vectors are protected by Web Security? (Choose Two)
A. Cloud
B. Data Center
C. Email
D. Voicemail
E. Web
Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?
A. advanced threat protection and rapid remediation
B. security automation
C. global threat intelligence
D. contextual awareness
Which two security areas are part of Cisco's campus and branch solutions? (Choose two.)
A. Network Analytics
B. File Retrospection and Trajectory
C. Remote Access VPN
D. Behavioral Indication of Compromise
E. Mobile Access
Which Tetration feature enforces consistent allow list policy access on premises data centers and pubic clouds to enable zero trust using application segmentation?
A. application access control
B. trusted access segmentation
C. automatic block listing
D. Enable a zero-trust model