Exam4Training

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)
A . WildFire analysis
B. Dynamic user groups (DUGs)
C. Multi-factor authentication (MFA)
D. URL Filtering Profiles

Answer: C,D

Exit mobile version