What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
Correct Answer:AB
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a-glance-c45-736555.pdf
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
Correct Answer:A
Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
Correct Answer:D
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two.)
Correct Answer:AD
Which command enables 802.1X globally on a Cisco switch?
Correct Answer:A
Reference: https://www.cisco.com/c/en/us/td/docs/routers/nfvis/switch_command/b-nfvis-switch-command-reference/802_1x_commands.html
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
Correct Answer:D
Reference: https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products