Which technology reduces data loss by identifying sensitive information stored in public computing environments?
Which technology reduces data loss by identifying sensitive information stored in public computing environments?A . Cisco SDAB . Cisco FirepowerC . Cisco HyperFlexD . Cisco CloudlockView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlockÂcloud-data-security-datasheet.pdf
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: AD
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C