Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

500-651 Questions and Answers

Question # 6

Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?

A.

Centralized policy management

B.

Context-aware access

C.

Patch management

D.

Platform exchange grid

Full Access
Question # 7

Which is a key feature that Advanced Malware Protection provides?

A.

Dynamic Content Analysis

B.

Reputation Analytics

C.

Retrospective Security

D.

Dynamic URL Filtering

Full Access
Question # 8

Which are three key features of DNS-layer security? (Choose three.)

A.

Identify the internet infrastructure used for attacks

B.

Protect any device on or off the network

C.

Real-time sandboxing

D.

Uncover current & emergent threats

E.

Data Loss Prevention

F.

Retrospective Analysis

Full Access
Question # 9

Which are two main features of Stateful Firewalling? (Choose two.)

A.

Clientless tagging

B.

File retrospection

C.

Full VX LAN support

D.

File reputation

Full Access
Question # 10

Which of AMP’s File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?

A.

Dynamic Analytics

B.

Malware Security

C.

File Retrospection

D.

Trajectory

Full Access
Question # 11

Which TrustSec feature allows customers to simplify firewall administration, avoiding the common rule explosions that happen when new servers are onboarded?

A.

Firewall administration

B.

Push policies

C.

Traffic tagging

D.

Regulate access

Full Access
Question # 12

Which Cisco product included in the Endpoint threat-centric solution?

A.

Umbrella

B.

ASAv

C.

Meraki MX

D.

Cloudlock

Full Access
Question # 13

Which are two main challenges of securing web and e -mail? (Choose two.)

A.

90% of cyber criminals use DNS in attacks

B.

Protecting against data centers

C.

Cyber Crime is a growing industry

D.

Securing could apps

Full Access