Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?(Choose two)
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?
Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time viewof activity?
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint isdeleted from an identity group?
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?