Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A company hosted multiple applications in the Kubernetes environment, using the naming app01, app02, and so on. An app01 user could access app02 data because no security measures are implemented. The administrator decided to place each application within a separate namespace and ensure that the namespaces are completely isolated and cannot communicate with each other. Which solution must be used to accomplish the task?

A.

HTTPRoute

B.

RoleBinding

C.

NetworkPolicy

D.

Gateway

A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?

A.

Implement an access list to block addresses from the previous password spray attack.

B.

Disable group aliases in the connection profiles.

C.

Change the AAA authentication method from RADIUS to TACACS+.

D.

Enable AAA authentication for the DefaultWEBVPN and DefaultRAGroup Connection Profiles.

A manufacturing company recently experienced a network-down scenario due to malware spread on the management network. The company wants to implement a solution to detect and mitigate a similar threat in the future and protect the overall network. Which solution meets the requirements?

A.

endpoint detection and response

B.

RADIUS

C.

encrypted threat analysis

D.

IPsec VPN

A company has been facing recurring issues with SQL injection vulnerabilities affecting the products, leading to significant disruptions for customers. To address the security concerns proactively, the company wants to integrate a tool into the CI/CD pipeline. The tool must be capable of identifying vulnerabilities such as SQL injection early in the development process, which allows developers to rectify issues before the code is deployed. Which solution must be implemented to meet the requirement?

A.

Static Application Security Testing tools, such as Checkmarx, Fortify, SonarQube

B.

build log observability tools, such as Splunk, Datadog

C.

workflow automation tools, such as GitHub Actions, Azure

D.

Dynamic Application Security Testing tools, such as OWASP ZAP, Veracode, Burp Suite

A global marketing firm, based in California with customers on every continent, suffered a data breach that exposed employee and customer PII. Which regulations is the company in danger of violating?

A.

ISO SP800-53

B.

FedRamp

C.

GDPR

D.

ISO27001

Which design policy addresses harmful content creation by generative AI?

A.

quantum resistant encryption

B.

watermarking

C.

retrieval augmented generation

D.

human in the loop

A bank experienced challenges with compromised endpoints gaining access to the internal network. To enhance security, the bank wants to ensure that all endpoints are scanned for compliance checks before being allowed to access the network. Which action achieves the level of security and control?

A.

Use MFA using Cisco DUO.

B.

Configure TrustSec using Cisco ISE.

C.

Set up data loss prevention policy.

D.

Implement Posture validation using Cisco ISE.