Question 281
How does Cisco Advanced Phishing Protection protect users?
Question 282
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
Question 283
What provides visibility and awareness into what is currently occurring on the network?
Question 284
Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two.)
Question 285
Which attack is preventable by Cisco ESA but not by the Cisco WSA?

