Question: 1
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question: 2
What provides visibility and awareness into what is currently occurring on the network?
Question: 3
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? {Choose two.)
Question: 4
An administrator is configuring a DHCP server to better secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Question: 5
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)