Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A manufacturing company implemented IoT devices throughout their smart factory and needs a security solution that meets these requirements:

    Protect IoT devices from network-based attacks.

    Visibility into communication patterns.

    Anomaly detection for IoT traffic.

Which firewall technology or feature should be recommended?

A.

zone-based firewall

B.

transparent firewall

C.

traditional firewall

D.

IPS/IDS

A company published software that had a security vulnerability, and an attacker used the vulnerability to steal critical information from the environment. The issue was reported by the security team, and the administrator was instructed to run shift-left security tests before publishing the software. Which component of the software development pipeline must be recommended to run the tests?

A.

continuous deployment

B.

cloud security posture management

C.

software bill of material analysis

D.

source code management

What does watermarking AI generated content prevent?

A.

massive resource consumption

B.

deep fakes

C.

harmful content

D.

scale changes

A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?

A.

Cisco TrustSec

B.

RADIUS server

C.

Cisco Umbrella

D.

network monitoring tool

How does a SOC leverage flow collectors?

A.

It performs data backup and recovery.

B.

It performs load balancing capabilities across systems to optimize performance.

C.

It provides data for analysis in threat detection and response system.

D.

It provides real-time content filtering.

A company recently discovered that a former employee, who left to join a competitor, continued to access and exfiltrate sensitive data over several weeks after leaving. The breach highlighted vulnerabilities in the organization’s data security and access management practices. To prevent such incidents in the future, the organization must adopt measures that detect and restrict unauthorized data access and transfer. Which mitigation strategy must be implemented to address the issue?

A.

Implement web application firewall.

B.

Upgrade network policy access.

C.

Implement data loss prevention strategy.

D.

Deploy audit logging and monitoring solution.

A video game company identified a potential threat of a SYN flood attack, which could disrupt the online gaming services and impact user experience. The attack can overwhelm network resources by exploiting the TCP handshake process, leading to server unavailability and degraded performance. To safeguard the company's infrastructure and ensure uninterrupted service, it is essential to enhance the security measures in place. The company must implement a solution that manages and mitigates the risk of such network-based attacks. Which security product must be implemented to mitigate similar risks?

A.

Cisco Web Security Appliance

B.

Cisco Umbrella

C.

Cisco Secure Endpoint

D.

Cisco Secure Firewall

A financial company is in the process of upgrading network access across the entire company. The solution must ensure: least privilege access control access across different network segments and increased security for employees. Which solution approach must the company take?

A.

NetFlow

B.

SNMP

C.

PKI

D.

RBAC

How is generative AI used in securing networks?

A.

to provide real-time load balancing

B.

to improve resource consumption

C.

to perform real-time audits to ensure regulatory compliance

D.

to detect unusual patterns in network traffic

The network security team of a private university is conducting a comprehensive audit to evaluate the security posture across the network infrastructure. During the review, the security team found that a trusted vendor disclosed serious vulnerabilities identified in a product that plays a crucial role in the university’s CI/CD pipeline. The security team must act promptly to mitigate the potential risks posed by these vulnerabilities. Which action must the security team take first in response to the disclosure?

A.

Leverage IDS to measure the impact of the vulnerability.

B.

Notify customers of the impact and its source.

C.

Confirm impact by validating presence of the product in company’s environment.

D.

Patch the impacted product as soon as possible.