Question 521

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)
  • Question 522

    Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?
  • Question 523

    Refer to the exhibit.

    What does the API do when connected to a Cisco security appliance?
  • Question 524

    How is DNS tunneling used to exfiltrate data out of a corporate network?
  • Question 525

    A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?