Cisco
300-740
90 Minutes
61
Designing and Implementing Secure Cloud Access for Users and Endpoints
A: Identify the malicious IPs and place them in a blocked list
B: Create an IP Block list and add the IP address of the affected endpoint
C: Enable scheduled scans to detect and block the executable files
D: Start isolation of the machine on the Computers tab
A: Updating antivirus signatures
B: Monitoring endpoint activity
C: Leveraging AI and machine learning
D: Analyzing network traffic patterns
A: Forced password change every 6 months
B: Use of a 100 ms delay between each authentication
C: Use of a password manager
D: Use of multifactor authentication for all accounts