Question 316

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two.)
  • Question 317

    Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.

    Question 318

    After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
  • Question 319

    The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
  • Question 320

    Drag and drop the cloud security assessment components from the left onto the definitions on the right.