Question 166
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
Question 167
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question 168
How many interfaces per bridge group does an ASA bridge group deployment support?
Question 169
What are two DDoS attack categories? (Choose two)
Question 170
Which form of attack is launched using botnets?