Question 6 of 80

What are the main features of Umbrella for Cloud-Delivered Security?
Answer

Suggested Answer

The suggested answer is D.

The main features of Umbrella for Cloud-Delivered Security include blocking malware, command and control (C2) callbacks, and phishing over any port or protocol. This comprehensive protection is essential for maintaining security across a range of internet activities and connections, making 'Blocks malware, C2 callbacks, & phishing over any port/protocol' the correct choice.

Community Votes3 votes
DSuggested
100%
Question 7 of 80

What are two core functionalities of DNS-layer security? (Choose two.)
Answer

Suggested Answer

The suggested answer is A, C.

DNS-layer security primarily focuses on preventing threats and enforcing security policies based on DNS analysis. Live threat intelligence helps in identifying and mitigating threats as they occur, which is a core functionality of DNS-layer security. URL filtering is another core functionality, allowing the system to block or allow access to specific domains based on security policies. Proxy and file inspection, real-time sandboxing, and data analytics are more associated with broader security measures and not specifically confined to DNS-layer security.

Community Votes2 votes
ABMost voted
100%
Question 8 of 80

Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)
Answer

Suggested Answer

The suggested answer is B, E.

Cyber Threat Defense & Network Analytics typically focus on securing cloud environments and endpoints. These services are designed to monitor traffic, detect anomalies, and prevent threats that can target various access points in a network, including the cloud platform and user end devices.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 80

What are two ways that Cisco helps customers secure IoT deployments? (Choose two.)
Answer

Suggested Answer

The suggested answer is B, C.

To secure IoT deployments, Cisco focuses on segmentation & visibility and cross-architecture automation. Segmentation & visibility helps in isolating IoT devices and providing insight into device behavior, thus enhancing security. Cross-architecture automation allows for consistent security policies and automated threat responses across different network architectures, which is crucial for a dynamic IoT environment.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 80

Which two security risks are created by legacy approaches to networking? (Choose two.)
Answer

Suggested Answer

The suggested answer is C, E.

Legacy networking approaches typically result in slow containment of security threats because these systems aren't optimized for rapid detection and mitigation. Additionally, they tend to create a large attack surface due to outdated infrastructure and protocols that can be easily exploited, increasing the vulnerability to attacks.

Community Votes2 votes
CESuggested
100%