Exam 50: Cisco Security Architecture for System Engineers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a key feature of Duo?

(Multiple Choice)
4.8/5
(34)

What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?

(Multiple Choice)
4.8/5
(43)

Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?

(Multiple Choice)
4.9/5
(36)

What are three main solutions areas for Advanced Threat? (Choose three.)

(Multiple Choice)
4.7/5
(30)

What are the competing IT and Operation Technology (OT) priorities that make securing IoT difficult?

(Multiple Choice)
4.7/5
(38)

Which two areas require secure access? (Choose two.)

(Multiple Choice)
4.8/5
(24)

What is used to reduce attack surfaces?

(Multiple Choice)
5.0/5
(45)

What are two key capabilities of Meraki? (Choose two.)

(Multiple Choice)
4.9/5
(30)

What are three major features of StealthWatch? (Choose three.)

(Multiple Choice)
4.8/5
(30)

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)

(Multiple Choice)
4.7/5
(34)

What percent of threats did ASA with FilePOWER block that earned AMP the highest security effectiveness scores in third-party testing?

(Multiple Choice)
4.7/5
(30)

Which two IoT environment layers are protected by AMP for Endpoints? (Choose two.)

(Multiple Choice)
4.7/5
(35)

What is a key feature of Application Visibility and Control?

(Multiple Choice)
4.9/5
(41)

What are three key benefits of Cisco NGFW? (Choose three.)

(Multiple Choice)
4.9/5
(38)

What are two features of Advanced Malware Protection (AMP)? (Choose two.)

(Multiple Choice)
4.9/5
(33)

How does AMP's file reputation feature help customers?

(Multiple Choice)
5.0/5
(30)

Which two attack vectors are protected by Malware Protection? (Choose two.)

(Multiple Choice)
4.9/5
(27)

What are two solutions for Cisco Cloud Security? (Choose two.)

(Multiple Choice)
4.9/5
(37)

What are two common seller obstacles? (Choose two.)

(Multiple Choice)
4.9/5
(34)

What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)

(Multiple Choice)
4.8/5
(44)
Showing 21 - 40 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)