Notifications
Clear all
Topic starter
03/06/2022 6:13 am
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites .
What must be done in order to prevent this from happening in the future?
- A . Modify an access policy
- B . Modify identification profiles
- C . Modify outbound malware scanning policies
- D . Modify web proxy settings
Suggested Answer: D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Access_Control_Rules__URL_Filtering.html
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Access_Control_Rules__URL_Filtering.html