Which Cisco security solution provides patch management in the cloud?
What are two differences between a Cisco Secure Web Appliance that is running in transparent mode and one running in explicit mode? (Choose two.)
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this
requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?
Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.
In which scenario is endpoint-based security the solution?
Which two parameters are used for device compliance checks? (Choose two.)
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
What are two list types within AMP for Endpoints Outbreak Control? (Choose two)
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
How does Cisco Stealthwatch Cloud provide security for cloud environments?
What are two benefits of workload security? (Choose two.)
Which type of attack is social engineering?
How does a Cisco Secure Firewall help to lower the risk of exfiltration techniques that steal customer data?
An administrator has been tasked with configuring the Cisco Secure Email Gateway to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two.)