Question: 1
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question: 2
What provides visibility and awareness into what is currently occurring on the network?
Question: 3
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented Which two actions must be taken in order to meet these requirements? (Choose two.)
Question: 4
Refer to the exhibit. An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC. The Cisco FTD uses a registration key of Cisc392368270 and is not behind a NAT device, Which command is needed to enable this on the Cisco FTD?
Question: 5
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)