1. Which Cisco security architectural framework helps design secure solutions for the various places in the network (PINs)?
- Cisco SAFE
- Cisco DNA
- Cisco ENFV
- Cisco NGFW
2. Which Cisco SAFE secure domain is concerned with the technologies involving access control, VPNs, and encryption?
- secure services
- security intelligence
- threat defense
- compliance
3. Which component in the AMP architecture makes the intelligent decisions on whether a file is clean, malicious, or unknown?
- AMP Cloud
- Cisco Talos
- AMP Connector
- Cisco Threat Grid
4. According to Gartner, Inc., what are three IPS functions that should be included in a next-generation IPS? (Choose three.)
- real-time contextual awareness
- advanced threat protection
- intelligent security automation
- application-level inspection
- stateful firewall protection
- advanced malware protection
5. Which security service is provided by 802.1x?
- port-based network access control
- malware analysis and protection across the full attack continuum
- malware analysis of files
- protection against emerging threats for Cisco products
6. Which three security concepts in the Cisco SAFE framework are used to evaluate each PIN? (Choose three.)
- compliance
- threat defense
- segmentation
- threat grid
- malware protection
- intrusion prevention
7. Which component of the Cisco SAFE framework consists of a team of security experts who develop threat intelligence that protects against threats for Cisco products?
- Cisco Talos
- Cisco Umbrella
- Cisco Stealthwatch
- Cisco ISE
8. What is a solution for identifying malware through file analysis performed in a controlled and monitored sandbox environment?
- Cisco Threat Grid
- Cisco Umbrella
- Cisco Stealthwatch
- Cisco ISE
9. Which security function is provided by a firewall?
- allows or blocks trafic by performing packet filtering and stateful inspection
- passively monitors network traffic and logs intrusion attacks for security analysis
- passively monitors network traffic and automatically blocks intrusion attacks
- aggregates and correlates threat events, contextual information, and network device performance data
10. What is the default timeout period for initiation of 802.1x authentication before the authenticator with MAB enabled proceeds with MAC authentication bypass?
- 30 seconds
- 90 seconds
- 120 seconds
- 180 seconds
11. Which two Cisco solutions are used by Cisco Web Security Appliance for real-time threat intelligence to protect against the latest threats? (Choose two.)
- Cisco Talos
- Cisco AMP
- Cisco Umbrella
- Cisco ISE
- Cisco Threat Grid
12. Which place in the network (PIN) typically contains the critical information assets and intellectual property of an organization?
- data center
- edge
- branch
- WAN
13. Which three threat protection capabilities are provided by Cisco ESA? (Choose three.)
- spam protection
- forged email detection
- phishing protection
- cloud access security
- Layer 4 traffic monitoring
- web filtering