What are two key capabilities of Meraki? (Choose Two)
A. contextual awareness
B. identity-based and device aware security
C. device profiling
D. security automation
E. application visibility and control
What does TrustSec assign to the user or device traffic at ingress that enforces the access policy based on the tag in the infrastructure?
A. Ingress VLAN
B. Access Control List
C. Security Group Tag
D. VXLAN
Which feature of ISE has the capability to encounter a device new on the market and correctly profile it to onboard it quickly and easily?
A. Context-aware access
B. Centralized policy management
C. Platform exchange grid
D. Device profiling
Which statement best embodies trust-centric security?
A. Protect users from attacks by enabling strict security policies.
B. Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.
C. Verify before granting access via identity-based policies for users, devices, apps, and locations.
D. Verify before granting access via MDM software.
What are three main solutions areas for Advanced Threat? (Choose Three)
A. Threat Defense
B. Intrusion Analytics
C. Threat Analytics
D. Network Analytics
E. NGFW
F. Malware Protection
What are two core functionalities of DNS-layer security? (Choose Two)
A. URL filtering
B. Rea-time sandboxing
C. Proxy and file inspection
D. Live threat intelligence
E. Data analytics and monitoring
Which two attack vectors are protected by MFA? (Choose Two)
A. Mobile
B. Endpoints
C. Data center
D. Web
E. Cloud
What are two solutions Cisco offers for email security? (Choose Two)
A. AMP for Email Security
B. Umbrella
C. Meraki
D. Tetration
E. Cloudlock
What are two ways that Cisco helps customers secure loT deployments? (Choose Two)
A. secure remote access
B. segmentationandvisibility
C. cross-architecture automation
D. network analysis
E. limited access points
What is one of the reasons that customers need a Visibility and Enforcement solution?
A. Storage is moving from on-premises to cloud-based
B. Businesses can't see or protect devices on their network
C. Organizations need the ability to block high-risk websites
D. Network traffic is growing at an exponential rate
What is one of the key features of Cognitive Intelligence?
A. It enables greater threat intelligence with entity modeling
B. It enhances anonymity with URL filtering
C. It enables safe email usage with event analytics
D. Allows visibility into anonymous and encrypted communications
Which two products empower customers to create secure next-gen networks? (Choose Two)
A. ISE
B. AMP
C. ACI
D. SD-Access
E. MFA
Which Web Security feature allows employees to utilize web applications while also having the ability to bock or monitor problematic applications?
A. Realtime Application Sandboxing
B. Application Phishing
C. Application Visibility and Control
D. Layered Scanning and Control
Which Tetration feature enforces consistent allow list policy access on premises data centers and pubic clouds to enable zero trust using application segmentation?
A. application access control
B. trusted access segmentation
C. automatic block listing
D. Enable a zero-trust model
In the Local Data Center Edge use case, which capabilities are provided by NGFW and NGIPS?
A. Identity Services Engine
B. Reduced attack surface of the on-premises datacenter
C. Platform exchange grid
D. File Retrospection and Trajectory