Question 536

Which technology reduces data loss by identifying sensitive information stored in public computing environments?
  • Question 537

    After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
  • Question 538

    Drag and drop the exploits from the left onto the type of security vulnerability on the right.

    Question 539

    An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?
  • Question 540

    Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?