Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?
B
Explanation:
ASAS Policy and Access SE Module 5
How does the Cisco AnyConnect AMP Module help to protect customer's networks?
D
Explanation:
ASAS Policy and Access SE Module 5
Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?
B
Explanation:
ASAS Policy and Access SE Module 5
Which three Cisco solutions are covered in the Advanced Threat module? (Choose three.)
A C F
Explanation:
ASAS Security Advanced Threats SE Module 6
Which three are deployment options for E-mail Security? (Choose three.)
A B E
How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and
block?
B
Explanation:
ASAS Security Web and Email SE Module 2
Which Stealthwatch component is a physical or virtual appliance that aggregates and normalizes NetFlow data?
C
Which feature of AMP tracks the movement of a file within the environment and monitors its disposition over time?
A
Explanation:
ASAS Security Advanced Threats SE Module 6
Which feature of ISE is Terminal Access Control System (TACACS) a part of?
A
Explanation:
ASAS Policy and Access SE Module 5
Which of AMPs File capabilities deals with the problem of files passing through perimeter defenses that are later discovered
to be a threat?
D
Explanation:
Tracks the spread of any file within your network and continuously monitors file reputation over time. If a file reputation
changes to malicious or is found by file sandboxing to be malicious, AMP provides retrospective alerting in the after phase.
AMP identifies every instance of the file within your network to address the problem of malicious files passing through
perimeter defenses that are later deemed a threat.
Reference:
https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guid
e/b_ScanCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0111
01.pdf