Question 21

Drag and drop the posture assessment flow actions from the left into a sequence on the right.

Question 22

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
  • Question 23

    Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.

    Question 24

    Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
  • Question 25

    An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN implementation. What must be un solution?