Question 166

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
  • Question 167

    After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
  • Question 168

    How many interfaces per bridge group does an ASA bridge group deployment support?
  • Question 169

    What are two DDoS attack categories? (Choose two)
  • Question 170

    Which form of attack is launched using botnets?