Question 116
Which attack type attempts to shut down a machine or network so that users are not able to access it?
Question 117
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
Question 118
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)
Question 119
In an IaaS cloud services model, which security function is the provider responsible for managing?
Question 120
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two.)
