Which three customer business objectives does Cisco's Advanced Threat solutions address? (Choose Three)
A. Lower TCO through intelligent API management
B. Visibility and control with a managed environment
C. Accelerated firewall implementation
D. Complete protection with holistic defense
E. Comprehensive support with flexible solutions
F. Secure communications with advanced access
Which two products are involved in granting safe access to apps? (Choose Two)
A. TrustSec
B. ISE
C. SD-Access
D. Duo
E. ACI
What is a key feature of Duo?
A. Provides SSL VPN
B. Authenticates user identity for remote access
C. Automates policy creation for IT staff
D. Supports pxGrid
What are two critical networking challenges? (Choose Two)
A. Access
B. Automation
C. Orchestation
D. Threat protection
E. Visibility
How do AMP's device trajectory capabilities help address customers' breach remediation issues?
A. It analyzes the data from suspicious files to provide a new level of threat intelligence.
B. It determines the scope and cause of an outbreak and tracks suspicious files
C. It tracks file behavior across the network to see which devices it enters and exits
D. It searches for potential threats based on identified activities and behaviors
Which two attack vectors are protected by Web Security? (Choose Two)
A. Cloud
B. Data Center
C. Email
D. Voicemail
E. Web
Which feature of AnyConnect provides better access security across wired and wireless connections with 802.1X?
A. Secure Layer 2 Network Access
B. AnyConnect with AMP
C. Trusted Network Detection
D. Flexible AAA Options
What are two features provided by ISE? (Choose Two)
A. DDOS attack prevention
B. Network visibility
C. Device Firewalling
D. Centralized policy management
E. Guest Management
What are two result of utilizing a fragmented security model? (Choose Two)
A. Decreased visibility and limited understand of security coverage.
B. Individual components pieced together to meet requirements.
C. Reduced malicious file risk through additional segmentation.
D. Increased identity controls.
E. Decreased network accessibility through multiple applications.
Which two attack vectors are protected by DNS-Layer security? (Choose two.)
A. Voicemail
B. Control layer
C. Email
D. Cloud
E. Endpoints