Which deployment model is the most secure when considering risks to cloud adoption?
D
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
B
Reference:
https://www.cisco.com/c/en/us/products/security/cloudlock/index.html#~features
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
A
Reference:
https://learn-umbrella.cisco.com/cloud-security/dns-tunneling
Which technology reduces data loss by identifying sensitive information stored in public computing environments?
D
Reference:
https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock-cloud-data-security-datasheet.pdf
In which cloud services model is the tenant responsible for virtual machine OS patching?
A
Reference:
https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paas-how-microsoft-office-365-azure-fit-in-021672.php
What is the function of Cisco Cloudlock for data security?
A
Reference:
https://umbrella.cisco.com/products/casb
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
B
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/asav/quick-start-book/asav-96-qsg/asav-aws.html
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
A
Which risk is created when using an Internet browser to access cloud-based service?
C
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
B