Which two attack vectors are protected by NGFW? (Choose two.)
A. Web
B. Cloud
C. Mobile
D. Data Center
E. Email
Which two benefits of flexible purchasing does Cisco provide? (Choose two.)
A. Simplify the datacenter
B. Meet immediate needs
C. Roll out more solutions
D. Plan for the future
E. Reduce training needs
What does remote access use to verify identity?
A. MFA
B. Remote Access VPN
C. Agents
D. AMP for Endpoints
What are two key Cisco loT use cases? (Choose two.)
A. Mobile Utilities
B. Financial Institutions
C. Parks and Recreation
D. Industrial Security
E. Connected Health
What are two results of utilizing a fragmented security model? (Choose two.)
A. Individual components pieced together to meet requirements.
B. Decreased visibility and limited understand of security coverage.
C. Reduced malicious file risk through additional segmentation.
D. Decreased network accessibility through multiple applications.
E. Increased identity controls.
What are two common seller obstacles? (Choose two.)
A. Unresponsive potential customers
B. Overcrowded portfolios
C. Complexity of solution components
D. Fragmented solutions
E. Seller competition
In which two ways should companies modernize their security philosophies? (Choose two.)
A. Reinforce their threat-centric security tactics.
B. Decrease internal access and reporting
C. Expand their IT departments.
D. Rebuild their security portfolios with new solutions
E. Complement threat-centric tactics with trust-centric methods.
What is an attribute of Cisco Talos?
A. Detection of threats communicated within 48 hours of occurrence
B. Blocks threats in real time C. Real-time threat information
D. D. 3rd party applications integrated through comprehensive APIs
Which two security risks are created by legacy approaches to networking? (Choose two.)
A. network downtime
B. user vulnerability
C. access points
D. slow containment
E. large attack surface
Which two products are involved in granting safe access to apps? (Choose two.)
A. ACI
B. Identify Services Engine
C. TrustSec
D. Duo
E. SD-Access
Which three products are Cisco Advanced Threat solutions? (Choose three.)
A. Stealthwatch
B. Web Security
C. Remote Access VPN
D. ThreatGrid
E. Advanced Malware Protection (AMP)
F. Next-Generation Firewall (NGFW)
G. Next-Generation Intrusion Prevention System (NGIPS)
Which two types of recurring revenue sales does Cisco offer? (Choose two.)
A. Platform subscription sale
B. License sale
C. Portfolio
D. Subscription sale
E. Training
Which two attack vectors are protected by Next-Generation Intrusion Prevention System (NGIPS)? (Choose two)
A. Cloud
B. Data Center
C. Corporate WAN
D. Endpoints
E. Email
Which two attack vectors are protected by Email Security? (Choose two.)
A. Voicemail
B. Mobile
C. Email
D. Web
E. Cloud
Which two aspects of Cisco solutions save customers money? (Choose two.)
A. fewer resources to manage
B. faster integration
C. replacing current infrastructure completely
D. 100% effectiveness