Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?
A. Trust modeling
B. Anomaly modeling
C. Anomaly detection
D. Event classification
What is one of the reasons that customers need a Visibility and Enforcement solution?
A. Storage is moving from on-premises to cloud-based
B. Businesses can't see or protect devices on their network
C. Organizations need the ability to block high-risk websites
D. Network traffic is growing at an exponential rate
What is one of the key features of Cognitive Intelligence?
A. It enables greater threat intelligence with entity modeling
B. It enhances anonymity with URL filtering
C. It enables safe email usage with event analytics
D. Allows visibility into anonymous and encrypted communications
What are two solutions Cisco offers for web securiity? (Choose Two) A. AMP for Web Security
B. NGFW
C. Cognitve Intelligence
D. CRES
E. Cloudlock
What is used to reduce attack surfaces?
A. Remediation
B. Segmentation
C. Device trust
D. Access
What are three security blind spots that must be addressed? (Choose Three)
A. Data
B. Applications
C. IT
D. Networks
E. Workloads
F. Email
Which two security risks are created by legacy approaches to networking? (Choose Two)
A. user vulnerability
B. network downtime
C. slow containment
D. access points
E. large attack surtace
Which two products empower customers to create secure next-gen networks? (Choose Two)
A. ISE
B. AMP
C. ACI
D. SD-Access
E. MFA
What do customers receive when implementing TrustSec?
A. Context-aware access enhancing the forensic capabilities available to their IT team
B. Device profiling and onboarding, enabling businesses to control company role policies across all network services
C. Dynamic role based access control that enables them to enforce business role policies across all network services
D. SSL decryption enabling secure communications on and off company networks
How does the AMP Module of AnyConnect help protect customers networks?
A. AMP can be launched from AnyConnect and deliver endpoint protection before traffic is tunneled to access the customer's network
B. AMP is a unified agent that combines posture check and authentication across wired, wireless, and VPN networks
C. AMP tracks malicious files as it travels through networks and devices
D. AMP provides highly secure access for select enterprise mobile applications