Question: 1
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question: 2
What provides visibility and awareness into what is currently occurring on the network?
Question: 3
Which two fields are defined in the NetFlow flow? {Choose two.)
Question: 4
A network engineer is configuring DMVPN and entered the crypto is akmp key cisc0380739941 address 0.0.0.0 command on host A The tunnel is not being established to host B. What action is needed to authenticate the VPN?
Question: 5
Which two preventive measures are used to control cross-site scripting? (Choose two.)