Which license subscription terms are available for AMP licensing?
A. 1 month 3 months 6 months
B. 1 year. 5 years. 10 years
C. 5 years 10 years 30 years
D. 1 year. 3 years. 6 years
Which feature of CTA can separate statistically normal traffic form anomalous traffic?
A. URL filtering
B. Trust modeling
C. Anomaly detection
D. Event classification
Which StealthWatch device monitors, analyzes, separates, categorizes, and stores information from each flow, allowing it to create a baseline of typical expected network activity?
A. Flow collector
B. Advanced malware protection
C. Forensic investigation
D. Malware clustering
Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?
A. Device profiting and onboarding
B. Role and device segmentation
C. Guest Access
D. Secure remote access
Which three features provided by NGFW and NGIPS support the Internet Edge' use case? (Choose three.)
A. Supports High Availability
B. Support for profiling devices
C. Supports dynamic routing protocols such as OSPF or BGP
D. Support for Platform exchange grid
E. Support for High Bandwith environments
F. Support for integrated posture assessment
Which option helps customers gain insight into security threats?
A. Limit volume of users to applications
B. Share sensitive data across Afferent platforms
C. Providing remote access VPN to allow mobile users to connect securely to customers network
D. Providing visibility into everything to allow granular security policies to be created and enforced
Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)
A. Cisco Defense Orchestrator
B. Cisco Umbrella
C. Cisco Identity Services Engine
D. Cisco Web Security Appliance
E. Cisco Email Security Appliance
Which feature of Cisco AnyConnect allows pie-login authentication using windows machines, or single sign-on user authentication using Windows logon credentials?
A. Secure Layer-2 Network Access
B. Flexible AAA Options
C. Differentiated Mobile Access
D. Trusted Network Detection
How many web requests does Talos process per month?
A. 1.5 million
B. 100,000
C. 130 billion
D. 130 million
Which is a key feature of Cisco Defense Orchestra?
A. Profiles devices connected to customer s network
B. Orchestrates security policy management form one place
C. Consolidates configuration management
D. Protects customers network against zero-day attacks