Question 6 of 62

What are two core functionalities of DNS-layer security? (Choose two.)

    Correct Answer: A, C

    DNS-layer security primarily focuses on preventing threats and enforcing security policies based on DNS analysis. Live threat intelligence helps in identifying and mitigating threats as they occur, which is a core functionality of DNS-layer security. URL filtering is another core functionality, allowing the system to block or allow access to specific domains based on security policies. Proxy and file inspection, real-time sandboxing, and data analytics are more associated with broader security measures and not specifically confined to DNS-layer security.

Question 7 of 62

Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)

    Correct Answer: B, E

    Cyber Threat Defense & Network Analytics typically focus on securing cloud environments and endpoints. These services are designed to monitor traffic, detect anomalies, and prevent threats that can target various access points in a network, including the cloud platform and user end devices.

Question 8 of 62

What are two ways that Cisco helps customers secure IoT deployments? (Choose two.)

    Correct Answer: B, C

    To secure IoT deployments, Cisco focuses on segmentation & visibility and cross-architecture automation. Segmentation & visibility helps in isolating IoT devices and providing insight into device behavior, thus enhancing security. Cross-architecture automation allows for consistent security policies and automated threat responses across different network architectures, which is crucial for a dynamic IoT environment.

Question 9 of 62

Which two security risks are created by legacy approaches to networking? (Choose two.)

    Correct Answer: C, E

    Legacy networking approaches typically result in slow containment of security threats because these systems aren't optimized for rapid detection and mitigation. Additionally, they tend to create a large attack surface due to outdated infrastructure and protocols that can be easily exploited, increasing the vulnerability to attacks.

Question 10 of 62

What are three security blind spots that must be addressed? (Choose three.)

    Correct Answer: A, B, E

    Three critical security blind spots that must be addressed are workloads, data, and applications. Workloads can be vulnerable to attacks if not properly monitored and secured. Data is essential to protect because it often contains sensitive information that can be exploited if breached. Applications, which are commonly used by end-users, can have vulnerabilities that need to be addressed to prevent unauthorized access and potential exploits.