Filters
Question type

Study Flashcards

How do AMP's device trajectory capabilities help address customers' breach remediation issues?


A) It analyzes the data from suspicious files to provide a new level of threat intelligence
B) It searches for potential threats based on identified activities and behaviors.
C) It determines the scope and cause of an outbreak and tracks suspicious files
D) It tracks file behavior across the network to see which devices it enters and exits

Correct Answer

verifed

verified

What is a continuous protection feature of Advanced Malware Protection?


A) File Reputation
B) Behavioral Indicators of Compromise
C) Global Threat Intelligence
D) Sandboxing File Analysis

Correct Answer

verifed

verified

Which feature of Cognitive intelligence can separate statistically normal traffic from anomalous traffic?


A) Anomaly modeling
B) Anomaly detection
C) Event classification
D) Trust modeling

Correct Answer

verifed

verified

Which two attack vectors are protected by Web Security? (Choose two.)


A) Web
B) Cloud
C) Voicemail
D) Data Center
E) Email

Correct Answer

verifed

verified

In which two ways should companies modernize their security philosophies? (Choose two.)


A) Rebuild their security portfolios with new solutions
B) Complement threat-centric tactics with trust-centric methods
C) Expand their IT departments
D) Decrease internal access and reporting
E) Reinforce their threat-centric security tactics

Correct Answer

verifed

verified

What are two critical networking challenges? (Choose two.)


A) Threat protection
B) Orchestration
C) Automation
D) Access
E) Visibility

Correct Answer

verifed

verified

What are three benefits that Cisco Umbrella brings to DNS-Layer Security? (Choose three.)


A) Reputation filtering
B) Malware scanning
C) Predictive intelligence
D) Breach mitigation
E) Off-network security
F) Recursive DNS

Correct Answer

verifed

verified

Which two elements does Advanced Malware Protection provide? (Choose two.)


A) dynamic data analysis
B) intrusion analysis
C) dynamic URL filtering
D) reputation analytics
E) advanced analytics

Correct Answer

verifed

verified

Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)


A) Network Analytics
B) Behavioral Indication of Compromise
C) Remote Access VPN
D) File Retrospection and Trajectory
E) Mobile Access

Correct Answer

verifed

verified

Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)


A) Web
B) Cloud
C) Data Center
D) Email
E) Endpoints

Correct Answer

verifed

verified

On average, how many days elapse before businesses discover that they have been hacked?


A) 50
B) 30
C) 10
D) 70

Correct Answer

verifed

verified

What are two core functionalities of DNS-layer security? (Choose two.)


A) Live threat intelligence
B) Proxy and file inspection
C) URL filtering
D) Real-time sandboxing
E) Data analytics and monitoring

Correct Answer

verifed

verified

What is an attribute of Cisco Talos?


A) Blocks threats in real time
B) Real-time threat information
C) 3rd party applications integrated through comprehensive APIs
D) Detection of threats communicated within 48 hours of occurrence

Correct Answer

verifed

verified

Where do you start to achieve true network visibility?


A) OT
B) Branches
C) IT
D) Fabric Level

Correct Answer

verifed

verified

What are two common customer obstacles? (Choose two.)


A) Compliance regulations
B) Security system blackouts
C) High turnover of IT professionals
D) Limited resources
E) Lack of solution integration

Correct Answer

verifed

verified

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?


A) Flexible AAA Options
B) Differentiated Mobile Access
C) High throughput maintained while still protecting domains against threats
D) Identity Service Engine

Correct Answer

verifed

verified

Showing 41 - 56 of 56

Related Exams

Show Answer