Question 13

Which two loT environment layers are protected by Stealthwatch? (Choose two.)

Correct Answer:AD

Question 14

Which two Cisco products help manage data access policy consistently? (Choose two.)

Correct Answer:BD

Question 15

Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)

Correct Answer:BE

Question 16

What are three main solutions areas for Advanced Threat? (Choose three.)

Correct Answer:AC

Question 17

What does ThreatGrid integrate?

Correct Answer:D

Question 18

What is a key feature of Application Visibility and Control?

Correct Answer:D

START 700-765 EXAM