Which two attack vectors are protected by Web Security? (Choose two.)
A. Email
B. Voicemail
C. Cloud
D. Web
E. Data Center
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
A. Limit internal access to networks.
B. Require and install agents on mobile devices.
C. Always verify and never trust everything inside and outside the perimeter.
D. Block BYOD devices.
E. Only grant access to authorized users and devices.
Which three products are used to secure the cloud? (Choose three.)
A. Umbrella
B. Tetration
C. NGFW
D. ESA
E. Meraki
F. Cloudlock
What are two common seller obstacles? (Choose two.)
A. Unresponsive potential customers
B. Overcrowded portfolios
C. Complexity of solution components
D. Fragmented solutions
E. Seller competition
In which two ways should companies modernize their security philosophies? (Choose two.)
A. Reinforce their threat-centric security tactics.
B. Decrease internal access and reporting
C. Expand their IT departments.
D. Rebuild their security portfolios with new solutions
E. Complement threat-centric tactics with trust-centric methods.
Which three products are Cisco Visibility and Enforcement solutions? (Choose three.)
A. Web Security
B. AnyConnect
C. TrustSec
D. Identity Services Engine (ISE)
E. Next-Generation Firewalls (NGFW)
F. Next-Generation Intrusion Prevention System (NGIPS)
G. Advanced Malware Protection (AMP) for Endpoints
What are two steps organizations must take to secure loT? (Choose two.)
A. update equipment
B. block contractors
C. remediate malfunctions
D. prevent blackouts
E. acquire subscription solutions
Which two benefits of streamlined management does Cisco provide? (Choose two.)
A. Unified management across multiple services
B. Siloed systems
C. Consolidated security monitoring
D. Centralized management
E. Device access control
Which two elements does Tetration provide for security posture and traffic analysis? (Choose two.)
A. Device updates
B. App process information
C. App access control
D. App dependency map
E. Hardware packages
Which option is a challenge that is often faced by small businesses when considering security solutions?
A. Enterprise-level firewalls
B. Limited budget
C. Large numbers of overseas employees
D. Solutions that lack email security