How is Cisco Umbrella configured to log only security events?
A
Reference:
https://docs.umbrella.com/deployment-umbrella/docs/log-management
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
D
What are two list types within Cisco AMP for Endpoints Outbreak Control? (Choose two.)
BD
Reference:
https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter 2
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)
BD
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?
B
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)
DE
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware.
Which two solutions mitigate the risk of this ransomware infection? (Choose two.)
AC
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?
A
Reference:
https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-response-edr.html
An engineer is configuring AMP for endpoints and wants to block certain files from executing.
Which outbreak control method is used to accomplish this task?
C
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from
ISE.
Which CoA type achieves this goal?
C