Exam 50: Cisco Security Architecture for System Engineers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which feature of ISE has the capability to encounter a device new on the market, and correctly profile it to onboard it quickly and easily?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

Which feature of StealthWatch aggregates and normalizes NetFlow data?

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

D

What is one of the key features of Cognitive Intelligence?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

What are two result of utilizing a fragmented security model? (Choose two.)

(Multiple Choice)
4.8/5
(33)

What are three main areas of the Cisco Security Portfolio? (Choose three.)

(Multiple Choice)
5.0/5
(34)

Which two attack vectors are protected by MFA? (Choose two.)

(Multiple Choice)
4.8/5
(37)

Which two attack vendors are protected by Visibility and Enforcement? (Choose two.)

(Multiple Choice)
4.8/5
(38)

Which two features are part of Cisco Web security? (Choose two.)

(Multiple Choice)
4.8/5
(35)

What are three security blind spots that must be addressed? (Choose three.)

(Multiple Choice)
4.9/5
(30)

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

(Multiple Choice)
4.8/5
(39)

What are two areas present a security challenge for customers? (Choose two.)

(Multiple Choice)
4.9/5
(35)

What is one of the reasons that customers need a Visibility & Enforcement solution?

(Multiple Choice)
4.9/5
(41)

Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?

(Multiple Choice)
4.9/5
(41)

Which two attack vectors are protected by NGFW? (Choose two.)

(Multiple Choice)
4.9/5
(35)

What does TrustSec assign to the user or device traffic at ingress that enforces the access policy based on the tag in the infrastructure?

(Multiple Choice)
4.8/5
(32)

Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)

(Multiple Choice)
4.7/5
(40)

What does remote access use to verify identity?

(Multiple Choice)
4.8/5
(31)

In which two ways has digitization transformed today's security threat landscape? (Choose two.)

(Multiple Choice)
4.9/5
(33)

How does SD-WAN protect network traffic from end-to-end?

(Multiple Choice)
4.9/5
(30)

How does AnyConnect provide highly secure access for select enterprise mobile apps?

(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)