Question 21

Which endpoint solution protects a user from a phishing attack?
  • Question 22

    An engineer must modify a policy to block specific addresses using Cisco Umbrell a. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?
  • Question 23

    Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
  • Question 24

    Drag and drop the NetFlow export formats from the left onto the descriptions on the right.

    Question 25

    Which algorithm provides encryption and authentication for data plane communication?