Question: 1
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question: 2
What provides visibility and awareness into what is currently occurring on the network?
Question: 3
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)
Question: 4
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict What is causing this issue?
Question: 5
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)