Question 66

Which action controls the amount of URI text that is stored in Cisco WSA logs files?
  • Question 67

    Which solution stops unauthorized access to the system if a user's password is compromised?
  • Question 68

    Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?
  • Question 69

    An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
  • Question 70

    Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?