Question 11

A user has a device in the network that is receiving too many connection requests from multiple machines.
Which type of attack is the device undergoing?
  • Question 12

    Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two.)
  • Question 13

    A customer has various external HTTP resources available including Intranet. Extranet, and Internet, with a proxy configuration running in explicit mode Which method allows the client desktop browsers to be configured to select when to connect direct or when to use the proxy?
  • Question 14

    Which two mechanisms are used to control phishing attacks? (Choose two)
  • Question 15

    How is Cisco Umbrella configured to log only security events?