Which characteristic is the foundation of Cisco Self-Defending Network technology?
A. secure connectivity
B. threat control and containment
C. policy management
D. secure network platform
Correct Answer: D
Explanation/Reference:
Explanation:
http://www.cisco.com/en/US/solutions/ns170/networking_solutions_products_genericcontent0900 aecd8051f378.html
Create a Stronger Defense Against Threats
Each day, you reinvent how you conduct business by adopting Internet-based business models. But Internet connectivity without appropriate security can compromise the gains you hope to make. In today’s connected environment, outbreaks spread globally in a matter of minutes, which means your security systems must react instantly.
Maintaining security using tactical, point solutions introduces complexity and inconsistency, but integrating security throughout the network protects the information that resides on it. Three components are critical to effective information security:
A secure network platform with integrated security to which you can easily add advanced security technologies and services
Threat control services focused on antivirus protection and policy enforcement that continuously monitor network activity and prevent or mitigate problems
Secure communication services that maintain the privacy and confidentiality of sensitive data, voice, video, and wireless communications while costeffectively extending the reach of your network
Explanation/Reference:
Explanation:
http://www.cisco.com/en/US/solutions/ns170/networking_solutions_products_genericcontent0900 aecd8051f378.html
Create a Stronger Defense Against Threats
Each day, you reinvent how you conduct business by adopting Internet-based business models. But Internet connectivity without appropriate security can compromise the gains you hope to make. In today’s connected environment, outbreaks spread globally in a matter of minutes, which means your security systems must react instantly.
Maintaining security using tactical, point solutions introduces complexity and inconsistency, but integrating security throughout the network protects the information that resides on it. Three components are critical to effective information security:
A secure network platform with integrated security to which you can easily add advanced security technologies and services
Threat control services focused on antivirus protection and policy enforcement that continuously monitor network activity and prevent or mitigate problems
Secure communication services that maintain the privacy and confidentiality of sensitive data, voice, video, and wireless communications while costeffectively extending the reach of your network