Question 551
How is ICMP used as an exfiltration technique?
Question 552
What is a difference between FlexVPN and DMVPN?
Question 553
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)
Question 554
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
Question 555
What must be enabled to secure SaaS-based applications?