Cisco Security Quiz Questions and Answers

Which threat involves software being used to gain unauthorized access to a computer system?

Answer :
  • virus

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Answer :
  • user input validation in a web page or web application

How does SD-WAN protect network traffic from end-to-end?

Answer :
  • Segmentation

Which two IoT environment layers are protected by Stealthwatch? (Choose two.)

Answer :
  • Control Layer
  • Things

What are two key Cisco IoT use cases? (Choose two.)

Answer :
  •  Industrial Security
  • Connected Health

What are the main features of Umbrella for Cloud-Delivered Security?

Answer :
  • Blocks malware, C2 callbacks, & phishing over any port/protocol

What are two ways that Cisco helps customers secure IoT deployments? (Choose two.)

Answer :
  • segmentation & visibility
  • secure remote access

Which two security risks are created by legacy approaches to networking? (Choose two.)

Answer :
  • slow containment
  • large attack surface

What are three security blind spots that must be addressed? (Choose three.)

Answer :
  •  Data
  • Networks
  • Applications

What does ThreatGrid integrate?

Answer :
  • Malware analysis and threat intelligence