- (Exam Topic 2)
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
Correct Answer:
B
- (Exam Topic 2)
What is a benefit of conducting device compliance checks?
Correct Answer:
B
- (Exam Topic 1)
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Correct Answer:
D
- (Exam Topic 2)
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?
Correct Answer:
C
The Application Visibility and Control (AVC) engine lets you create policies to control application activity on the network without having to fully understand the underlying technology of each application. You can configure application control settings in Access Policy groups. You can block or allow applications individually or according to application type. You can also apply controls to particular application types.
- (Exam Topic 3)
An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?
Correct Answer:
B
Reference:
https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/5eU6DfQV/LTRSEC-2240-LG2.pdf