- (Exam Topic 3)
What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.)
Correct Answer:
AC
- (Exam Topic 3)
Which threat intelligence standard contains malware hashes?
Correct Answer:
A
- (Exam Topic 2)
Which type of algorithm provides the highest level of protection against brute-force attacks?
Correct Answer:
D
- (Exam Topic 3)
Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?
Correct Answer:
A
- (Exam Topic 1)
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Correct Answer:
B