Question 31

Drag and drop the capabilities from the left onto the correct technologies on the right.

Question 32

Drag and drop the solutions from the left onto the solution's benefits on the right.

Question 33

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
  • Question 34

    Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers and can be stopped by Cisco Umbrella?
  • Question 35

    A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two)