An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?
What is an advantage of network telemetry over SNMP pulls?
A network engineer must configure a Cisco Secure Email Gateway to prompt users to enter two forms of information before gaining access. The Secure Email Gateway must also join a cluster machine using preshared keys. What must be configured to meet these requirements?
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
For which type of attack is multifactor authentication an effective deterrent?
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
Which Cisco solution provides a comprehensive view of Internet domains. IP addresses, and autonomous systems to help pinpoint attackers and malicious infrastructures?
A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)
An engineer is configuring cloud logging on Cisco ASA and needs events to compress. Which component must be configured to accomplish this goal?
Which ESA implementation method segregates inbound and outbound email?
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,
data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity
platform. What should be used to meet these requirements?
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two)
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
What are two workloaded security models? (Choose two)