Cisco Threat Defense is based on which product?
Cisco Threat Defense is based on which product? A. Adaptive Security Appliance B. LancopeStealthWatch C. Plixer Scrutinizer D. SoftPerfect Network Scanner
Cisco Threat Defense is based on which product? A. Adaptive Security Appliance B. LancopeStealthWatch C. Plixer Scrutinizer D. SoftPerfect Network Scanner
What alternative exists for propagating SGTs when network devices do not have hardware support for TrustSec? A. SXP B. SGACL C. Cisco Discovery Protocol D. TrustSec Exchange Protocol
How is a TrustSec tag used with a site-to-site VPN? A. by being passed separately along with packet B. by being preserved in the GRE/IPsec VPN header C. by being marked as a TrustSec packet D. by being added to…
Which unique feature of TrustSec is used for end-to-end security policy control? A. zoning B. mapping C. masking D. tagging
What are the two simplest methods to give guest users access to the Internet? (Choose two.) A. public DNS service B. Cisco CWS tower C. private DNS service D. private CWS tower E. FVRF for guest UIs
Which route is needed in the global table for internal users to access the Internet? A. route to the service provider B. route to the internal DNS server C. default route D. static route to Internet web sites
What can be used to replace static ACLs on Internet-facing interfaces? A. dynamic ACLs B. service provider firewalls C. VPNs D. zone-based firewalls
Which URL is used to verify that Cisco CWS is working as configured? A. http://whoami.scansafe.net/ B. http://whoami.cws.net/ C. http://verify.scansafe.net/ D. http://verify.cws.net/
What is integrated into Cisco ISR G2 router platforms? A. Cisco CWS license B. ScanCenter portal C. Cisco CWS connector D. Cisco CWS tower
What is one way to implement security consistently across hub-and-spoke routers? A. FVRF B. VRF C. ACL D. RIPv4