On what is the Cisco security approach based?
Answer : A
Along with IPsec, strict access lists, and CWS, what should you include when using a direct Internet connection as part of your Cisco IWAN security solution?
Answer : A
Which cloud-based SAAS solution provides industry-leading security and control for the distributed enterprise?
Answer : A
What is one way to implement security consistently across hub-and-spoke routers?
Answer : A
What is integrated into Cisco ISR G2 router platforms?
Answer : C
Which URL is used to verify that Cisco CWS is working as configured?
Answer : A
What can be used to replace static ACLs on Internet-facing interfaces?
Answer : D
Which route is needed in the global table for internal users to access the Internet?
Answer : C
What are the two simplest methods to give guest users access to the Internet? (Choose two.)
Answer : AE
Which unique feature of TrustSec is used for end-to-end security policy control?
Answer : D
How is a TrustSec tag used with a site-to-site VPN?
Answer : B
What alternative exists for propagating SGTs when network devices do not have hardware support for TrustSec?
Answer : A
Cisco Threat Defense is based on which product?
Answer : B
Which type of data and analyses does Cisco Threat Defense collect to establish behavior baselines?
Answer : B
What should you do to all three planes of the Cisco IOS router?
Answer : C