Which feature of StealthWatch aggregates and normalizes NetFlow data?
A.
Netflow analytics
B.
Forensic investigation
C.
Advanced malware protection
D.
FlowCollector
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
What are two areas present a security challenge for customers? (Choose two.)
A.
Email
B.
Corporate priorities
C.
IoT devices
D.
IT departments
E.
OT environments
Answer:
ac
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 3
What are two key capabilities of Meraki? (Choose two.)
A.
identity-based and device-aware security
B.
application visibility and control
C.
device profiling
D.
contextual awareness
E.
security automation
Answer:
ab
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 4
What does remote access use to verify identity?
A.
Agents
B.
MFA
C.
Remote Access VPN
D.
AMP for Endpoints
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
What are two common customer obstacles? (Choose two.)
A.
Compliance regulations
B.
Security system blackouts
C.
High turnover of IT professionals
D.
Limited resources
E.
Lack of solution integration
Answer:
rdae
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 6
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?
A.
Telemetry, shared intelligence, and profiling sources
B.
Context, telemetry and intelligence sources
C.
Intelligence sources, telemetry, and shared intelligence
D.
Context, telemetry, and profiling sources
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
What are two result of utilizing a fragmented security model? (Choose two.)
A.
Reduced malicious file risk through additional segmentation.
B.
Decreased network accessibility through multiple applications.
C.
Decreased visibility and limited understand of security coverage.
D.
Increased identity controls
E.
Individual components pieced together to meet requirements.
Answer:
ce
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 8
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A.
AMP for Endpoints
B.
Duo
C.
Cisco Security Connector
D.
pxGrid
E.
Stealthwatch
Answer:
ae
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 9
What are two features provided by ISE? (Choose two.)
A.
Device Firewalling
B.
Guest Management
C.
DDOS attack prevention
D.
Centralized policy management
E.
Network visibility
Answer:
bd
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 10
What are two tenants of establishing an SD-perimeter? (Choose two.)