Which are two reasons perimeter-based network security is no longer sufficient? (Choose two )
A. more vulnerabilities
B. more IT professionals
C. more networks
D. more devices
E. more users
What are two ways Cisco addresses customers' growing business needs? (Choose two.)
A. Multi/hybrid cloud platforms
B. Highly-scalable DC platforms
C. Bulletproof NGFW appliances
D. Consolidated tracking and reporting
E. Multiple solution deployment choices
Which three products are used to secure the cloud? (Choose three.)
A. Umbrella
B. Tetration
C. NGFW
D. ESA
E. Meraki
F. Cloudlock
In which two ways should companies modernize their security philosophies? (Choose two.)
A. Reinforce their threat-centric security tactics.
B. Decrease internal access and reporting
C. Expand their IT departments.
D. Rebuild their security portfolios with new solutions
E. Complement threat-centric tactics with trust-centric methods.
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)
A. Advanced Malware Protection
B. Identity Services Engine
C. Industrial Network Director
D. Cisco Security Connector
E. Duo
Which two types of recurring revenue sales does Cisco offer? (Choose two.)
A. Platform subscription sale
B. License sale
C. Portfolio
D. Subscription sale
E. Training
Where do you start to achieve true network visibility?
A. Branches
B. Fabric Level
C. OT
D. IT
What is used to reduce attack surfaces?
A. Access
B. Remediation
C. Segmentation
D. Device trust
What are two common customer obstacles? (Choose two.)
A. Lack of solution integration
B. High turnover of IT professionals
C. Compliance regulations
D. Limited resources
E. Security system blackouts
Which option is a challenge that is often faced by small businesses when considering security solutions?
A. Enterprise-level firewalls
B. Limited budget
C. Large numbers of overseas employees
D. Solutions that lack email security