Question: 1
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question: 2
What provides visibility and awareness into what is currently occurring on the network?
Question: 3
Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two.)
Question: 4
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
Question: 5
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two.)