Which two products are involved in granting safe access to apps? (Choose Two)
A. TrustSec
B. ISE
C. SD-Access
D. Duo
E. ACI
Which statement best embodies trust-centric security?
A. Protect users from attacks by enabling strict security policies.
B. Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.
C. Verify before granting access via identity-based policies for users, devices, apps, and locations.
D. Verify before granting access via MDM software.
What are two core functionalities of DNS-layer security? (Choose Two)
A. URL filtering
B. Rea-time sandboxing
C. Proxy and file inspection
D. Live threat intelligence
E. Data analytics and monitoring
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose Two)
A. Only grant access to authorized users and devices.
B. Require and install agents on mobile devices.
C. Block BYOD devices.
D. Always verify and never trust everything inside and outside the perimeter.
E. Limit internal access to networks.
What are three benefits that Cisco Umbrella brings to DNS-Layer Security? Choose three.
A. Malware scanning
B. Breach mitigation
C. Recursive DNS
D. Reputation flirting
E. Predictive intelligence
F. Off-network security
What is an attribute of Cisco Talos?
A. Detection of threats communicated within 48 hours of occurrence
B. 3d party applications integrated through comprehensive APIs
C. Real-time threat information
D. Blocks threats in real time
How does AMP's file reputation feature help customers?
A. It increases the protection to systems with exact fingerprinting
B. It increases the accuracy of threat detection with Big Data analytics
C. It enables point in time detection through a one-to-one engine
D. It enables secure web browsing with cognitive threat analytics
What feature of web security filters websites based on who what where, how, and when to assign a website a score?
A. Sandbox Filtering
B. Reputation Filtering
C. Malware Filtering D. URL Analytics
Which attack vector is protected by Email Security?
A. Endpoints
B. Voicemail
C. Mobile
D. Web
Which two attack vectors are protected by DNS-Layer security? (Choose two.)
A. Voicemail
B. Control layer
C. Email
D. Cloud
E. Endpoints