What is key feature of Cognitive Threat Analytics?
Answer : B
Explanation:
ASAS Security Advanced Threats SE Module
Which two features are part of the ISE Plus license? (Choose two.)
Answer : AC
Explanation:
ASAS Policy and Access SE Module 5
Which feature of AnyConnect provides you the ability to identify data breaches as they happen?
Answer : B
Explanation:
ASAS Policy and Access SE Module 5
Which Cisco solution falls under cloud security?
Answer : C
Explanation:
ASAS Cisco Cloud Security SE "" Module 3
How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?
Answer : A
Explanation:
ASAS Security Web and Email SE Module 2
Which options describes how Cisco solutions enable customer's businesses?
Answer : D
Which three Cisco solutions are covered in the Advanced Threat module? (Choose three)
Answer : ACF
Explanation:
ASAS Security Advanced Threats SE Module 6
What two challenges do customers face in their Campus and Branch deployments? (Choose two)
Answer : AB
Which feature of ISE is Terminal Access Control System (TACACS) a part of?
Answer : A
Explanation:
ASAS Policy and Access SE Module 5
Which three values are provided by NGFW and NGIPS in the "Campus NGFW" use case? (Choose three.)
Answer : ABD
Which feature discovers and controls malicious cloud apps connected to the corporate environment?
Answer : B
Explanation:
Cisco Cloudlock Apps Firewall discovers and controls malicious cloud apps connected to your corporate environment, and provides the world"™s largest crowd- sourced security solution to identify individual app risk, using our Community Trust Rating.
Reference: https://www.cloudlock.com/platform/app-discovery/
Which are two main features of DDoS Attack Prevention? (Choose two.)
Answer : AB
How does AMP"™s file reputation feature help customers?
Answer : A
Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/ b_ScanCenter_Administrator_Guide_chapter_011101.pdf
Which of AMP"™s File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?
Answer : D
Explanation:
Tracks the spread of any file within your network and continuously monitors file reputation over time. If a file reputation changes to malicious or is found by file sandboxing to be malicious, AMP provides retrospective alerting in the after phase. AMP identifies every instance of the file within your network to address the problem of malicious files passing through perimeter defenses that are later deemed a threat.
Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/ b_ScanCenter_Administrator_Guide_chapter_011101.pdf