Which two options are attack vectors of the threat- centric defense? (Choose two.)
Which Stealthwatch component is a physical or virtual appliance that aggrages and normalizes NetFlow data?
Which three options does Cisco provide customers in terms of “Visibility and Control” against today’s threats? (Choose three.)
Which StealthWatch device monitors, analyzes, separates, categorizes, and stores information from, allowing it to create a baseline of type expected network activity?
Which three Cisco solutions are covered in the Advanced Threat module? (Choose three.)
Which three values are provided by NGFW and NGIPS in the “Campus NGFW”? (Choose three.)
Which is a security product that was covered in the Policy and Access security module?
Which feature discovers and controls malicious cloud apps connected to the corporate environment?
Which are two key Cisco benefits of the web threat-centric solution? (Choose two.)
Which three features provided by NGFW and NGIPS support the “Internet Edge” use case? (Choose three.)
Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three.)
Which two options are attack vectors protected by Identity and Access Control? (Choose two.)
Which feature of CTA can separate statistically normal traffic form anomalous traffic?
Which feature of Cisco AnyConnect allows pre-login authentication using windows machines, or single sign-on user authentication using Windows logon credentials?