Which two Cisco products help manage data access policy consistently? (Choose Two)
A. Cloudlock
B. pxGrid
C. Steathwatch
D. Duo
E. AMP for Endpoints
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A. pxGrid
B. Cisco Security Connector
C. Duo
D. Stealthwatch
E. AMP for Endpoints
What are two reasons why perimeter-based network security is no longer sufficient? (Choose Two)
A. More users
B. More IT professionals
C. More devices
D. More networks
E. More vulnerabilities
What are three main solutions areas for Advanced Threat? (Choose Three)
A. Threat Defense
B. Intrusion Analytics
C. Threat Analytics
D. Network Analytics
E. NGFW
F. Malware Protection
Which two attack vectors are protected by MFA? (Choose Two)
A. Mobile
B. Endpoints
C. Data center
D. Web
E. Cloud
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose Two)
A. Only grant access to authorized users and devices.
B. Require and install agents on mobile devices.
C. Block BYOD devices.
D. Always verify and never trust everything inside and outside the perimeter.
E. Limit internal access to networks.
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?
A. Trust modeling
B. Anomaly modeling
C. Anomaly detection
D. Event classification
What are three benefits that Cisco Umbrella brings to DNS-Layer Security? Choose three.
A. Malware scanning
B. Breach mitigation
C. Recursive DNS
D. Reputation flirting
E. Predictive intelligence
F. Off-network security
What is an attribute of Cisco Talos?
A. Detection of threats communicated within 48 hours of occurrence
B. 3d party applications integrated through comprehensive APIs
C. Real-time threat information
D. Blocks threats in real time
Which feature of ISE enables ecosystem partner platforms to execute network actions with the Cisco network infrastructure?
A. context-aware access
B. centralized policy management
C. device profiling
D. platform exchange grid