Question: 1
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question: 2
What provides visibility and awareness into what is currently occurring on the network?
Question: 3
How does Cisco Umbrella archive logs to an enterprise-owned storage?
Question: 4
Which two fields are defined in the NetFlow flow? {Choose two.)
Question: 5
When configuring ISAKMP for IKEv1 Phase 1on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP address in this command is used for. What would he the effect of changing the IP address from 0,0.0 0 to 1,2.3.4?