In the zero-trust network access model, which criteria is used for continuous verification to modify
trust levels?
C
Refer to the exhibit.
Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to
block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed.
What should be done to meet the requirement?
B
Refer to the exhibit.
Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is
occurring?
C
Refer to the exhibit.
Refer to the exhibit. An engineer must configure the Cisco ASA firewall to allow the client with IP
address 10.1.0.6 to access the Salesforce login page at https://www.salesforce.com. The indicated
configuration was applied to the firewall and public DNS 4.4.4.4 is used for name resolution;
however, the client still cannot access the URL. What should be done to meet the requirements?
A
Refer to the exhibit.
Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv1 VPN that will use
AES256 and SHA256 on a Cisco ASA firewall. The indicated configuration was applied to the firewall;
however, the tunnel fails to establish. Which two IKEv1 policy commands must be run to meet the
requirement? (Choose two.)
A, E
Which method is used by a Cisco XDR solution to prioritize actions?
C
DRAG DROP
Drag and drop the five core functions from the left into the order defined by the NIST Cyber security
Framework on the right.

Refer to the exhibit.
Refer to the exhibit. An engineer must configure a global allow list in Cisco Umbrella for the
cisco.com domain. All other domains must be blocked. After creating a new policy and adding the
cisco.com domain, the engineer attempts to access a site outside of cisco.com and is successful.
Which additional Security Settings action must be taken to meet the requirement?
C
An administrator received an incident report indicating suspicious activity of a user using a corporate
device. The manager requested that the credentials of user [email protected] be reset and synced via
the Active Directory. Removing the account should be avoided and used for further investigation on
data leak. Which configuration must the administrator apply on the Duo Admin Panel?
D
What helps prevent drive-by compromise?
A