Question 76

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?
  • Question 77

    What is the difference between deceptive phishing and spear phishing?
  • Question 78

    A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two)
  • Question 79

    Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)
  • Question 80

    What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?