What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to
prevent the session during the initial TCP communication?
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
Refer to the exhibit.

An engineer is implementing a certificate based VPN. What is the result of the existing configuration?
An engineer implements Cisco CloudLock to secure a Microsoft Office 365 application in the cloud. The engineer must configure protection for corporate files in case of any incidents. Which two actions must be taken to complete the implementation? (Choose two.)
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your
environment?
A network administrator needs a solution to match traffic and allow or deny the traffic based on the type of application, not just the source or destination address and port used. Which kind of security product must the network administrator implement to meet this requirement?
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally
manage cloud policies across these platforms. Which software should be used to accomplish this goal?
Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion
events that are flagged as possible active breaches?
What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?