Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which three features provided by NGFW and NGIPS support the “Internet Edge” use case? (Choose three.)

A.

Supports High Availability

B.

Support for profiling devices

C.

Supports dynamic routing protocols such a s OSPF or BGP

D.

Support for Platform exchange grid

E.

Support for High Bandwith environments

F.

Support for integrated posture assessment

Which two options are attack vectors of the threat- centric defense? (Choose two.)

A.

Voicemail

B.

Backups

C.

Mobile

D.

Video surveillance

E.

Cloud apps

Which Cisco solutions falls under cloud security?

A.

Umbrella

B.

Identity Services Engine

C.

Firepower Threat Defense

D.

Cisco Defense Orchestrator

What two challenges do customers face in their Campus and Branch deployments? (Choose two.)

A.

Securing the entire infrastructure

B.

Stopping data breaches across campuses and branches

C.

Protect data across multiple cloud applications

D.

Monitoring file behavior across a large set of endpoints

E.

Understanding what our users are doing online

Which Cisco solution falls under Advanced Threat?

A.

Email Defense

B.

Identity Services Engine

C.

Malware Protection

D.

Anti-spoofing

Which StealthWatch device monitors, analyzes, separates, categorizes, and stores information from, allowing it to create a baseline of type expected network activity?

A.

Forensic investigation

B.

Advanced malware protection

C.

Malware clustering

D.

Flow collector

Which is a main element of FirePOWER Device Manager?

A.

On-box, Web-based management

B.

Streamlined user experience

C.

Simplified interface

D.

Cloud-ba sed policy orchestration

Which feature of AnyConnect provides you the ability to identify data breaches as they happen?

A.

Flexible AAA Options

B.

Network Visibility Module

C.

Differentiated Mobile Access

D.

Trusted Network Detection

Which two Cisco solution are part of the Mobile threat centric solution? (Choose two.)

A.

Cisco AnyConnect

B.

Cisco Umbrella

C.

Cisco NGFW

D.

Cisco NGIPS

E.

Cisco Defense Orchestrator

Which two options are attack vectors protected by Identity and Access Control? (Choose two.)

A.

Backups

B.

Mobile

C.

Endpoints

D.

Cloud apps

E.

Voicemail