Full Transcript

Which attack vectors are protected by: Cyber Defense and Network Analytics? Choose 2 A- cloud *B- endpoint C- web D- data Center* E- email Correct Answer: AD ------------------------------------------------------------------------ Which are two areas that require secure access? Choose 2 A- work...

Which attack vectors are protected by: Cyber Defense and Network Analytics? Choose 2 A- cloud *B- endpoint C- web D- data Center* E- email Correct Answer: AD ------------------------------------------------------------------------ Which are two areas that require secure access? Choose 2 A- workspace B- worktable C- workforce *D- workflow E- workloads* Correct Answer: CE ------------------------------------------------------------------------ Which customer use case will be challenged by inconsistent protection, coverage gaps, and exposure to unwanted security vulnerabilities? A- vulnerable cloud & B- growing business & C- limited mobility & D- small budget & E- compliance issues & Correct Answer: None ------------------------------------------------------------------------ What are the two steps for IoT protection that companies should take? Choose 2 A- acquire subscription solutions B- remediate failures *C- have updated equipment* D- prevent blackouts E- hire contractors Correct Answer: BC ------------------------------------------------------------------------ What are two concerns for customers with a low budget? Choose 2 A- the security budget has decreased *B- multiple devices are leaving a security gap* C- licenses are too cheap D- too many security vendors to manage E- products are not bundled Correct Answer: AB ------------------------------------------------------------------------ Customers with compliance standards are dealing with which issues? Choose 2 A- device incompatibility B- email exposure *C- costly malware attacks D- lack of access policies* E- malware attacks F- inconsistent oversight Correct Answer: BD ------------------------------------------------------------------------ What are the two results a customer gets from using a fragmented security model? Choose 2 A- reduced visibility and limited understanding of security coverage *B- decreased network accessibility through multiple applications C- reduced risk of malicious files through additional segmentation D- individual components gathered to meet requirements* E- greater identity control Correct Answer: AD ------------------------------------------------------------------------ Which of the following refers to an attribute of Cisco Talos? A- blocks threats in real time B- third-party applications integrated through comprehensive APIs C- real-time threat information\* D- detection of threats communicated within 48 hours of occurrence Correct Answer: C What is an attribute of Cisco Talos? A. detection of threats communicated within 48 hours of occurrence B. real-time threat information\* C. third-party applications integrated through comprehensive APIs D. blocks threats in real time Correct Answer: B \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Which option best describes how a Cisco solution enables business for a customer? A- better continuous analysis\* B- single comprehensive tool for policy enforcement C- faster threat identification D- better scalability and environment change capability Correct Answer: A ------------------------------------------------------------------------ Which solution works for consumers to eliminate security gaps and ensure secure data access and storage in the cloud by all devices? A- anyconnect B- trustsec C- next generation firewall D- cloudlock E- stealthwatch\* F- amp threat grid Correct Answer: E ------------------------------------------------------------------------ What are the two product options for a cloud application threat-centric solution? Choose 2 A- Cloudlock *B- ise C- talos* D- stealthwatch E- meraki Correct Answer: AC ------------------------------------------------------------------------ Which alternatives refer to the three options for cloud security products? Choose 3 A- ngfw B- investigate *C- meraki D- cloudlock* E- web security appliance F- umbrella\* Correct Answer: BDF ------------------------------------------------------------------------ What are the three problems that customers with limited mobility solutions deal with? Choose 3 A- remote workers compromising security *B- large data center vulnerability C- solutions that do not extend outside the network* D- complex mobile management\* E- costly malware attacks Correct Answer: ACD ------------------------------------------------------------------------ Which two products below are involved in discovery, classification, and profile verification? Choose 2 A- cisco security connector B- advanced malware protection C- industrial network director *D- duo E- identity services engine* Correct Answer: CE ------------------------------------------------------------------------ What are the two business values that demonstrate Cisco's end-to-end protection capabilities and protection across the attack continuum? Choose 2 A- cost-effectiveness B- control *C- protection* D- completeness E- flexibility Correct Answer: BC ------------------------------------------------------------------------ Which three products below are part of the Cisco advanced threat solution? Choose 3 A- threatgrid *B- advanced malware protection (amp)* C- next generation intrusion prevention system (ngips) D- web security E- remote access vpn F- next generation firewall (ngfw) G- stealtwatch\* Correct Answer: ABG ------------------------------------------------------------------------ To reduce an attack surface, we use: A- remediation B- access C- segmentation\* D- device trust Correct Answer: C ------------------------------------------------------------------------ Which two options are features of an endpoint threat-focused solution? Choose 2 A- remote VPN B- antivirus defense *C- fuzzy fingerprinting* D- URL filtering E- web proxy Correct Answer: B, C ------------------------------------------------------------------------ In the process of calculating recovery costs, which two elements will be considered? Choose 2 A- time in hours to rebuild servers *B- number of compromised servers* C- server downtime in hours D- average revenue per hour Correct Answer: A, B ------------------------------------------------------------------------ Which alternative below incorporates trust-centered security? A- verify before granting access via MDM software B- verify before granting access by employing identity-based policies for users, their devices, applications, and locations\* C- prevent attacks through an intelligence-based policy and then detect, investigate, and remediate D- protect users from attacks by enabling strict security policies Correct Answer: B ------------------------------------------------------------------------ Which three products are used to secure the cloud? Choose 3 A- Tetration *B- Cloudlock* C- ESA D- NGFW E- Umbrella\* F- Meraki Correct Answer: A, B, E ------------------------------------------------------------------------ What are the two main use cases for Cisco's solution in IoT environments? Choose 2 A- parks and recreation B- mobile utilities C- financial institutions D- connected health *E- industrial security* Correct Answer: D, E ------------------------------------------------------------------------ Customers with cloud vulnerability issues deal with? Choose 3 A- appropriate level of access *B- complex mobile management C- use of shadow IT applications* D- costly malware attacks E- solution that does not extend to the cloud F- lack of protection for cloud applications\* Correct Answer: A, C, F ------------------------------------------------------------------------ How has digitalization transformed the current security threat landscape? Choose 2 A- reduction in third-party applications B- expanding complexity *C- reduction in the endpoint ecosystem D- reduction in applications E- growing ecosystem* Correct Answer: B, E ------------------------------------------------------------------------ Which three alternatives below represent the main issues for customers expanding their businesses? A- no scalable solution *B- inconsistent containment tools C- device incompatibility D- business growing too fast* E- security does not extend to the cloud\* F- inconsistent network monitoring Correct Answer: A, D, E ------------------------------------------------------------------------ Which two factors influence conversations in an IoT environment? Choose 2 A- detection B- protection C- motivation *D- maturity* E- prevention Correct Answer: C, D ------------------------------------------------------------------------ Which two attack vectors are protected by Cisco's NGFW solution? Choose 2 A- cloud *B- mobile C- web D- data center* E- email Correct Answer: A, D ------------------------------------------------------------------------ Which alternatives refer to the two attack vectors protected by the next-generation intrusion prevention system (NGIPS)? Choose 2 A- endpoints B- cloud *C- corporate WAN* D- email E- data center Correct Answer: B, C ------------------------------------------------------------------------ Which two types of sales generate recurring revenue that Cisco offers? Choose 2 A- platform subscription sales *B- subscription sales C- license sales* D- training E- portfolio Correct Answer: A, C ------------------------------------------------------------------------ Email security protects which attack vectors? Choose 2 A- data center B- cloud *C- email D- web* E- voicemail Correct Answer: B, D ------------------------------------------------------------------------ What are the three factors a customer should consider when choosing the ideal security solutions provider? Choose 3 A- offers more than just niche market products *B- generates higher margins on each sale C- creates new market opportunities D- offers lower-cost solutions E- is committed to security* F- provides excellent partner and customer support\* Correct Answer: A, E, F ------------------------------------------------------------------------ Which NGFW equipment would be recommended for a small business that requires multi-layer protection and task automation? A- Cisco 500 Series ISR B- Cisco 4000 Series NGIPS C- ASA 4100 Series D- ASA 5500-X with Firepower\* E- Firepower 3100 Series Correct Answer: D ------------------------------------------------------------------------ Which alternatives are three outcomes that Cisco offers to customers for comprehensive protection against current security threats? Choose 3 A- accelerated threat identification B- accelerated threat identification *C- threat-centric defense* D- enhanced remediation E- manual security intelligence updates F- sporadic application analysis\* Correct Answer: B, C, F ------------------------------------------------------------------------ Which two areas will Cisco support its customers in protecting from IoT? Choose 2 A- automation across architectures B- segmentation and visibility *C- secure remote access* D- insights into future hiring needs E- network analysis Correct Answer: B, C In which two areas does Cisco help customers secure IoT deployments? (Choose two.) A. cross-architecture automation B. secure remote access *C. network analysis D. segmentation and visibility* E. insight into future hiring needs Correct Answer: BD ------------------------------------------------------------------------ Which two attack vectors are protected by Visibility & Enforcement solutions? Choose 2 A- mobile *B- web C- cloud* D- endpoints E- email Correct Answer: A, C ------------------------------------------------------------------------ Which alternatives refer to the two reasons why perimeter-based network security is no longer sufficient? Choose 2 A- more users *B- more networks C- more vulnerabilities D- more devices* E- more IT professionals Correct Answer: A, D ------------------------------------------------------------------------ Which two attack vectors are protected by the web security solution? Choose 2 A- web *B- data center* C- voicemail D- cloud E- email Correct Answer: A, B ------------------------------------------------------------------------ Which two Cisco solutions below generate successful business outcomes for customers? Choose 2 A- endpoint visibility *B- hardened solutions C- enhanced visibility D- firewall protection* E- comprehensive threat protection Correct Answer: A, D ------------------------------------------------------------------------ What are the two security risks created by legacy network approaches? Choose 2 A- access points B- user vulnerability C- attack surface *D- slow containment* E- network downtime Correct Answer: C, D Which two security risks are created by legacy approaches to networking? (Choose two.) A. access points B. large attack surface *C. slow containment* D. user vulnerability E. network downtime Correct Answer: BC \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Which alternatives are the two ways Cisco supports customers in dealing with compliance issues? Choose 2 A- removal of reporting requirements B- providing identity verification *C- ensuring all employees have access to all files D- removal of bureaucratic security labels E- protecting email communications* Correct Answer: B, E What are two ways Cisco helps customers navigate compliance issues? (Choose two.) A. providing identity verification *B. removing bureaucratic security tags C. removing reporting requirements D. ensuring all employees have access to all files E. securing email communications* Correct Answer: AE \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Which two options below are features of a web threat-focused solution? Choose 2 A- email security B- identity & access control C- URL filtering *D- CTA & threat defense E- data loss prevention* Correct Answer: C, E ------------------------------------------------------------------------ Which component of the Stealthwatch solution uses sophisticated security analytics to accelerate response times to threats? A- anomaly detection B- threat protection C- network control D- investigation\* Correct Answer: D ------------------------------------------------------------------------ Which two attack vectors are protected by the email security solution? Choose 2 A- email *B- web C- voicemail D- mobile* E- cloud F- Tetration Correct Answer: A, D ------------------------------------------------------------------------ Which problems will be solved by the Cisco Security Advantage program? Choose 2 A- needing an unlimited consumption model B- having an end-of-year budget *C- having a defined consumption level* D- requiring customized investments E- having undefined security expenditures Correct Answer: B, C ------------------------------------------------------------------------ How does Cisco's access policy solution handle a constantly changing user base in a growing company? A- How does Cisco's access policy solution handle a constantly changing user base in a growing company?\* B- Cisco offers the ability to monitor and restrict application usage as applications become more complex, providing flexibility to control all or subsets of applications C- Cisco's architecture offers the lowest TCO by providing products that integrate, reducing the cost of IT configuration, management, and maintenance D- The Cisco Talos Security Intelligence and Research Group integrates with all security solutions, providing advanced protection against new threats Correct Answer: A ------------------------------------------------------------------------ How does Cisco meet the growing business needs of its customers? Choose 2 A- Multi-cloud and hybrid cloud platforms B- Tracking and consolidated reporting C- Highly scalable DC platforms *D- Bulletproof NGFW devices E- Various solution deployment options* Correct answer: C, E ------------------------------------------------------------------------ Which Cisco network security product provides a unified image and has an intuitive interface? A- Next Generation Intrusion Prevention System B- Firepower Threat Defense C- Advanced Malware Protection\* D- Cloudlock Correct answer: C ------------------------------------------------------------------------ Which two products are involved in granting secure access to applications on a network? Choose 2 A- TrustSec B- Duo *C- ACI D- Identity Services Engine* E- SD Access Correct answer: B, D ------------------------------------------------------------------------ What are the three options for threat-centric solutions and features in a data center? Choose 3 A- Global threat intelligence B- Enabling scalability and capacity across the enterprise *C- Continuous threat protection at all levels* D- File reputation E- File trajectory F- Enhanced visibility of data, users, and device behavior\* Correct answer: B, C, F ------------------------------------------------------------------------ Which three products below are part of the Cisco Visibility and Enforcement architecture? Choose 3 A- TrustSec *B- Advanced Malware Protection (AMP) for Endpoints C- Next Generation Firewalls (NGFW) D- Next Generation Intrusion Prevention System (NGIPS) E- AnyConnect* F- Identity Services Engine (ISE)\* Correct answers: A, E, F Which three products are Cisco Visibility and Enforcement solutions? (Choose three.) A. Next-Generation Firewalls (NGFW) B. Next-Generation Intrusion Prevention System (NGIPS) C. TrustSec *D. Advanced Malware Protection (AMP) for Endpoints E. AnyConnect* F. Identity Services Engine (ISE)\* Correct Answer: CEF \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Which two options are campus and branch threat-centric solutions? Choose 2 A- Investment Made and Protected *B- Network Analysis C- Retrospection and File Trajectory D- NGFW and NGIPS* E- Behavioral Indication of Compromise Correct answers: A, D ------------------------------------------------------------------------ Which two products below enable customers to define next-generation secure networks? Choose 2 A- ISE B- SD Access *C- ACI* D- AMP E- MFA Correct answers: B, C Which two products empower customers to create secure next-gen networks? (Choose two.) A. AMP B. ACI *C. MFA D. SD-Access* E. ISE Correct Answer: BD \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Which alternatives are two common obstacles for technology-consuming customers? Choose 2 A- Limited Resources B- Security System Outages C- Business Compliance Regulations *D- High Turnover of IT Professionals E- Lack of Solution Integration* Correct answers: C, E What are two common customer obstacles? (Choose two.) A. limited resources B. compliance regulations *C. security system blackouts D. high turnover of IT professionals E. lack of solution integration* Correct Answer: BE \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Which two vectors are protected from attacks by the remote access VPN solution? Choose 2 A- email B- voicemail C- cloud D- mobile *E- campus & branch* Correct answer: D E ------------------------------------------------------------------------ What are the three customer use cases that lead to better outcomes? Choose 3 A- proposing better scalability B- offering flexible deployment options *C- providing comprehensive protection* D- offering powerful and integrated products\* E- better remediation F- faster threat identification Correct answer: B, C, D. ------------------------------------------------------------------------ On average, how much do network attacks cost? A- 300b B- 300k\* C- 500k D- 50k Correct answer: B. ------------------------------------------------------------------------ What are the two Cisco products that address network, cloud, and device threats? Choose 2 A- Stealthwatch *B- Cisco Secure Connector C- Duo D- Identity Services Engine E- AMP for Endpoints* Correct answer: A, E. ------------------------------------------------------------------------ What functionality does remote access use to verify identity upon access? A- agents B- MFA\* C- AMP for Endpoints D- remote access VPN Correct answer: B. ------------------------------------------------------------------------ Which alternatives are two common obstacles for technology salespeople? Choose 2 A- complexity of solution components *B- fragmented solutions C- unresponsive potential clients D- a large portfolio of products and services* E- competition from other vendors Correct answer: A, D. What are two common seller obstacles? (Choose two.) A. overcrowded portfolios *B. fragmented solutions C. seller competition D. unresponsive potential customers E. complexity of solution components* Correct Answer: AE \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Which three options constitute the main areas of Cisco's security portfolio? Choose 3 A- web and email security *B- cloud security* C- ASA and NGIPS D- advanced threat\* E- policy and entry F- roaming security Correct answer: A, B, D. ------------------------------------------------------------------------ Which option best describes how Cisco partners can help their customers by leveraging an exclusive relationship using Cisco's resources and support? A- access to 24-hour support worldwide B- being the first to receive innovations C- earning higher margins on each deal D- leveraging incentive programs\* Correct answer: D. ------------------------------------------------------------------------ Which two options below are part of a Cisco email threat-centric solution? Choose 2 A- Meraki B- Cisco Umbrella *C- AMP for Endpoints D- Cloudlock E- Cisco Registered Envelope Service* F- web filtering Correct answer: B, E. ------------------------------------------------------------------------ What are the two steps customers should take to evolve towards a trust-centric security philosophy? Choose 2 A- grant access only to authorized users and devices *B- always verify and never trust anything inside and outside the perimeter* C- limit internal network access D- block BYOD devices E- block Tetration devices F- require and install agents on mobile devices Correct answer: A, B. Which two steps should customers take to evolve to a trust-centric security philosophy? (Choose two.) A. Limit internal access to networks. B. Only grant access to authorized users and devices. *C. Always verify and never trust everything inside and outside the perimeter.* D. Block BYOD devices. E. Require and install agents on mobile devices. Correct Answer: BC \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ What are two security risks created by legacy network approaches? Choose 2 A- large attack surface *B- network downtime C- access points D- slow containment* E- user vulnerability Correct answer: A, D. ------------------------------------------------------------------------ What are two benefits of the Opportunity Incentive Program? Choose 2 A- supports customer lifecycle focus B- strengthens customer success management C- facilitates quick quoting to reduce time to market D- reinforces partners' demand-generation capabilities *E- encourages partner-driven opportunity creation efforts* Correct answer: D, E. What are two benefits of the Opportunity Incentive Program? (Choose two.) A. supports a focus on the customer lifecycle B. facilitates rapid quoting to decrease time to market C. incentivizes partner-driven opportunity creation efforts *D. strengthens customer success management E. reinforces partner demand-generation capabilities* Correct Answer: CE \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Where will a user begin to achieve true visibility of their network? A- fabric level\* B- branches C- OT D- IT Correct answer: A. Where does a user start to achieve true network visibility? A. Fabric Level\* B. IT C. OT D. Branches Correct Answer: A ------------------------------------------------------------------------ Which two attack vectors are protected by identity and access control? Choose 2 A- endpoints B- campus and home *C- voicemail D- cloud apps* E- data center Correct answer: B, D. ------------------------------------------------------------------------ What are two ways Cisco supports customers in balancing protection and accessibility? Choose 2 A- analyzing user and device vulnerability B- managing risks more effectively across the environment *C- strengthening device infrastructure with a broad security portfolio D- providing vital training to ensure a skilled workforce E- leveraging integrated tools and dynamic contexts to enforce policies* Correct answer: B, E. ------------------------------------------------------------------------ The Cisco industry is differentiated by: Choose 3 A- largest selection of security solutions B- unmatched support and services *C- unchallenged threat blocking D- lowest price E- best-in-class technologies* F- unparalleled commitment to security\* Correct answer: B, E, F. ------------------------------------------------------------------------ Which Cisco ISR equipment is recommended for a small business that requires integrated switching and routing and WAN redundancy? A- Cisco 800 Series ISR B- Firepower 7000 Series C- Firepower 8000 Series D- Cisco 4000 Series ISR\* E- Firepower 2100 Series Correct answer: D. ------------------------------------------------------------------------ What are the two ways Cisco addresses resource constraints for customers? Choose 2 A- enabling many features through an appliance *B- extended support to the data center C- environment control through URL filtering and AVC* D- consolidated training E- hardware updates for IoT devices Correct answer: A, C. ------------------------------------------------------------------------ What are the two security areas that are part of Cisco's web solutions? Choose 2 A- malware protection *B- email security C- URL filtering D- identity & access control E- web security* Correct answer: A, E. ------------------------------------------------------------------------ What are the two benefits of simplified management that Cisco offers? Choose 2 A- centralized management *B- unified management across multiple services* C- consolidated security monitoring D- device access control E- isolated systems Correct answer: A, B. ------------------------------------------------------------------------ Which alternatives refer to the three products in Cisco's web and email security portfolio? Choose 3 A- CES *B- Investigate C- Meraki D- ESA* E- Umbrella F- WSA\* Correct answer: A, D, F. ------------------------------------------------------------------------ What is the main challenge for a potential customer caused by the wide variety of security solution providers available in the market? A- contacting all providers for information B- finding a low-cost option C- determining the best security product D- finding the right provider to offer the best value\* Correct answer: D. ------------------------------------------------------------------------ What are the two elements that the Tetration solution provides for security posture and traffic analysis? Choose 2 A- application dependency mapping *B- hardware packages C- application access control D- application process information* E- device updates Correct answer: A, D. ------------------------------------------------------------------------ Which two attack vectors are protected by cloud app security solutions? Choose 2 A- voicemail B- email C- mobile *D- cloud apps E- campus & branch* Correct answer: C, E. ------------------------------------------------------------------------ How does the Cisco ACI solution provide a single point of support? A- management B- visibility\* C- orchestration D- automation Correct answer: B. ------------------------------------------------------------------------ What are the two security areas provided by Cisco's email solutions? Choose 2 A- CDT & network analytics B- identity services C- malware protection *D- DNS layer security* E- cloud app security Correct answer: C, D. ------------------------------------------------------------------------ In what two ways should companies modernize their security philosophies? Choose 2 A- complement threat-centric tactics with trust-centric methods *B- reinforce their threat-centric security tactics* C- reduce internal access and reporting D- expand their IT departments E- rebuild their security portfolios with new solutions Correct answer: A, B. In which two ways should companies modernize their security philosophies? (Choose two.) A. Reinforce their threat-centric security tactics. *B. Decrease internal access and reporting. C. Complement threat-centric tactics with trust-centric methods.* D. Rebuild their security portfolios with new solutions. E. Expand their IT departments. Correct Answer: AC \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ What are the two benefits of flexible purchasing that Cisco offers its customers? Choose 2 A- meeting immediate needs *B- reducing training needs C- simplifying the data center D- implementing more solutions E- planning for the future* Correct answer: A, E. ------------------------------------------------------------------------ Customers with cloud vulnerability issues deal with: Choose 3 A- appropriate level of access *B- costly malware attacks C- lack of protection for cloud applications* D- solution that does not extend to a cloud E- use of applications invisible to employees\* F- complex mobile management Correct answer: A, C, E. ------------------------------------------------------------------------ Which component of the Cisco AMP solution provides the details customers need to resolve issues after identifying a breach? A- filesandboxmg B- context awareness C- continuous analysis D- rapid remediation\* Correct answer: D. ------------------------------------------------------------------------ Which alternatives refer to the three main areas of Cisco's security portfolio? Choose 3 A- firewalls B- roaming security C- voice & collaboration D- advanced threat *E- IoT security* F- cloud security\* Correct answer: D, E, F

Use Quizgecko on...
Browser
Browser