After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
A) Modify web proxy settings.
B) Modify outbound malware scanning policies.
C) Modify identification profiles.
D) Modify an access policy.
Correct Answer:
Verified
Q81: What is the purpose of the My
Q82: A network administrator is using the Cisco
Q83: An engineer wants to automatically assign endpoints
Q84: An engineer is configuring a Cisco ESA
Q85: What must be configured in Cisco ISE
Q87: What is the purpose of the Decrypt
Q88: Which Cisco product provides proactive endpoint protection
Q89: An MDM provides which two advantages to
Q90: Which technology is used to improve web
Q91: For which two conditions can an endpoint
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents