1.
Which route is needed in the global table for internal users to access the Internet?
2.
Which unique feature of TrustSec is used for end-to-end security policy control?
3.
How is a TrustSec tag used with a site-to-site VPN?
4.
What alternative exists for propagating SGTs when network devices do not have hardware support for TrustSec?
5.
Cisco Threat Defense is based on which product?
6.
Which type of data and analyses does Cisco Threat Defense collect to establish behavior baselines?
7.
What should you do to all three planes of the Cisco IOS router?
8.
Which type of product is Cisco UCS E140S?
9.
What is Cisco Cloud Connector?
10.
What is Cisco CWS?