Podcast
Questions and Answers
What needs to be provided to the customer for a TAP mode deployment?
What needs to be provided to the customer for a TAP mode deployment?
- A Best Practice Assessment tool
- A SSL decryption rulebase
- A URL Filtering Profile
- A SPAN port (correct)
What is an objective of the Security Lifecycle Review?
What is an objective of the Security Lifecycle Review?
- To provide recommendations for device management access
- To identify the visibility and presence of command-and-control sessions
- To present personal user information (correct)
- To identify sanctioned and unsanctioned SaaS applications
Which of the following is a setting required to enable Credential Phishing Prevention?
Which of the following is a setting required to enable Credential Phishing Prevention?
- Enable User-ID (correct)
- Define a URL Filtering Profile
- Enable App-ID
- Define an SSL decryption rulebase
When HTTP header logging is enabled on a URL Filtering profile, what attribute-value can be logged?
When HTTP header logging is enabled on a URL Filtering profile, what attribute-value can be logged?
What is a task identified in the Best Practice Assessment tool?
What is a task identified in the Best Practice Assessment tool?
What is a step in the preparation of an evaluation unit?
What is a step in the preparation of an evaluation unit?
Which security service is used to prevent abuse of stolen credentials?
Which security service is used to prevent abuse of stolen credentials?
What type of security chain is supported by the Decryption Broker?
What type of security chain is supported by the Decryption Broker?
Which method is used to check for Corporate Credential Submissions?
Which method is used to check for Corporate Credential Submissions?
What cloud-delivered security service is recommended for the headquarters only?
What cloud-delivered security service is recommended for the headquarters only?
What feature is used to prevent abuse of stolen credentials in addition to multi-factor authentication?
What feature is used to prevent abuse of stolen credentials in addition to multi-factor authentication?
What type of security service is used to block access to a business site due to a false-positive?
What type of security service is used to block access to a business site due to a false-positive?
What is the primary goal of a file blocking profile in a security policy?
What is the primary goal of a file blocking profile in a security policy?
Which feature must be enabled to prevent attacks from undetectable sources?
Which feature must be enabled to prevent attacks from undetectable sources?
What is a crucial consideration when deploying User-ID?
What is a crucial consideration when deploying User-ID?
Which mechanism prevents a command-and-control connection from succeeding?
Which mechanism prevents a command-and-control connection from succeeding?
What is the primary purpose of a Best Practice Assessment?
What is the primary purpose of a Best Practice Assessment?
What is a key benefit of using HTTP Header Logging?
What is a key benefit of using HTTP Header Logging?
Flashcards are hidden until you start studying