Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
Which interface mode does a Cisco Secure IPS device use to block suspicious traffic?
What is a characteristic of Dynamic ARP Inspection?
What is the difference between EPP and EDR?
Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?
In which cloud services model is the tenant responsible for virtual machine OS patching?
How does the Cisco WSA enforce bandwidth restrictions for web applications?
When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key
establishment?
What are two benefits of using Cisco Duo as an MFA solution? (Choose two.)
What is the role of an endpoint in protecting a user from a phishing attack?
Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two.)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services
Engine? (Choose two)
Under which two circumstances is a CoA issued? (Choose two)
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint
Protection Platform?