Which two attack vectors are protected by Web Security? (Choose two.)
A. Email
B. Voicemail
C. Cloud
D. Web
E. Data Center
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A. Duo
B. Identity Services Engine
C. Stealthwatch
D. Cisco Security Connector
E. AMP for Endpoints
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
A. Expanding complexity
B. Growing ecosystem
C. Decreasing endpoint ecosystem
D. Decreasing 3rd party applications
E. Decreased access points
Which component of AMP provides the details customers need to address problems after a breach is identified?
A. Rapid remediation
B. Filesandboxmg
C. Continuous analysis
D. Context awareness
Which statement embodies trust-centric security?
A. Verify before granting access via MDM software
B. Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate
C. Protect users from attacks by enabling strict security policies.
D. Verify before granting access via identity-based policies for users, devices, apps. and locations
Which two products empower customers to create secure next-gen networks? (Choose two.)
A. AMP
B. ISE
C. ACI
D. SD-Access
E. MFA
What are two ways that Cisco helps customers balance protection and accessibility? (Choose two )
A. Leverage integrated tools and dynamic context to enforce policies
B. Reinforce device infrastructure with an extensive security portfolio
C. Provide vital training to ensure a skilled workforce.
D. Analyze user and device vulnerability.
E. Manage risk more effectively across the environment.
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)
A. Advanced Malware Protection
B. Identity Services Engine
C. Industrial Network Director
D. Cisco Security Connector
E. Duo
Which two attack vectors are protected by Visibility and Enforcement? (Choose two.)
A. Mobile
B. Cloud
C. Email
D. Web E. Endpoints
What are two common customer obstacles? (Choose two.)
A. Lack of solution integration
B. High turnover of IT professionals
C. Compliance regulations
D. Limited resources
E. Security system blackouts