Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Which technology reduces data loss by identifying sensitive information stored in public computing environments?A . Cisco SDAB . Cisco FirepowerC . Cisco HyperFlexD . Cisco CloudlockView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock­cloud-data-security-datasheet.pdf

March 11, 2020 No Comments READ MORE +

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling

March 11, 2020 No Comments READ MORE +

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: AD

March 10, 2020 No Comments READ MORE +

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C

March 9, 2020 No Comments READ MORE +