Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?
For a given policy in Cisco Umbrella, how should a customer block website based on a custom list?
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)
An engineer is deploying Cisco Advanced Malware Protection (AMP) for Endpoints and wants to create a policy that prevents users from executing file named abc424952615.exe without quarantining that file What type of Outbreak Control list must the SHA.-256 hash value for the file be added to in order to accomplish this?
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the “Chat and Instant Messaging” category. Which reputation score should be selected to accomplish this goal?
An organization recently installed a Cisco Secure Web Appliance and would like to take advantage of the AVC engine to allow the organization to create a policy to control application-specific activity. After enabling the AVC engine, what must be done to implement this?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?