What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications. Which
vulnerability allows the attacker to see the passwords being transmitted in clear text?
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the
organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which
mechanism should the engineer configure to accomplish this goal?
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the “Chat and Instant Messaging†category. Which reputation score should be selected to accomplish this goal?
Drag and drop the threats from the left onto examples of that threat on the right
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?