DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
3. objective
4. network
5. Which of the following allows bad actors to gain
access to and control endpoint resources over an
extended period to steal valuable data without being
detected?
1. Malware
2. Medium persistent threat
3. Advanced persistent threat
4. Ransomware
6. Which of the following enables devices and users to
be identified and provisioned and enables policies to
be applied?
1. Cisco AMP
2. Cisco ISE
3. Cisco Threat Grid
4. Cisco Firepower Management Center
7. Which of the following describes Threat Grid?
1. A VPN solution from Cisco
2. A unified malware analysis and threat intelligence platform
3. A threat intelligence organization
4. An intelligence security framework
8. Which of the following are used to indicate that a
system has been affected by some form of malware?
1. IoTs
2. IOCs
3. Snort
4. Reports

FOUNDATION TOPICS


CISCO’S SECURITY PORTFOLIO


Cisco’s security portfolio is vast. This chapter provides an
introduction to some of its critical security products. In
addition, it covers the APIs that each of these products
supports.


As shown in Figure 11-1, the Cisco security portfolio
focuses on three areas: visibility, segmentation, and

Free download pdf