A furniture company recently discovered that the endpoint detection and response configuration flagged several malicious files on company-managed laptops. The company must enhance security to prevent known malicious files from being delivered to the network and endpoints. The new solution must enhance the company’s ability to inspect and filter incoming traffic effectively. Which security product must be used to accomplish this goal?
A technology company recently onboarded a new customer in the medical space. The customer needs a solution to provide data integrity across remote sites. Which solution must be used to meet this requirement?
A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?
A security engineer on an application design team must choose a framework of attack patterns to evaluate during threat modeling. Which framework provides the common set of attacks?
A software development company uses multiple cloud providers to host applications. The company is designing a scalable firewall solution that must meet the requirements:
Consistent security policies across multiple cloud environments.
Centralized visibility and management.
Scalability to accommodate different cloud platforms.
Which type of firewall meets the requirements?
What is a use for AI in securing network infrastructure?
A manufacturing company implemented IoT devices throughout their smart factory and needs a security solution that meets these requirements:
Protect IoT devices from network-based attacks.
Visibility into communication patterns.
Anomaly detection for IoT traffic.
Which firewall technology or feature should be recommended?
A construction company recently introduced a BYOD policy, where contractors can bring personal devices and connect to the wireless network. The network engineer configured a Wi-Fi network with a guest splash page to provide internet access only. Although the policy was limited to wireless devices, contractors started bringing devices that needed wired connections without authorization and connecting to the network. The network team suggested shutting down ports where unauthorized devices are connected. Which technology must be implemented to ensure that wired and wireless devices are granted network access only after successful authentication?
A manufacturing company experienced a security breach that resulted in sales data being compromised. An engineer participating in the investigation must identify who logged into the sales system during the affected period. Which approach must be used to gather the information?
A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?
TESTED 21 Mar 2026