ExamGecko
Question list
Search
Search

Question 177 - 350-701 discussion

Report
Export

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?

A.

Modify an access policy

Answers
A.

Modify an access policy

B.

Modify identification profiles

Answers
B.

Modify identification profiles

C.

Modify outbound malware scanning policies

Answers
C.

Modify outbound malware scanning policies

D.

Modify web proxy settings

Answers
D.

Modify web proxy settings

Suggested answer: D

Explanation:

URL conditions in access control rules allow you to limit the websites that users on your network can access. This feature is called URL filtering. There are two ways you can use access control to specify URLs you want to block (or, conversely, allow):

– With any license, you can manually specify individual URLs, groups of URLs, and URL lists and feeds to achieve granular, custom control over web traffic.

– With a URL Filtering license, you can also control access to websites based on the URL's general classification, or category, and risk level, or reputation. The system displays this category and reputation data in connection logs, intrusion events, and application details.

Using category and reputation data also simplifies policy creation and administration. It grants you assurance that the system will control web traffic as expected. Finally, because Cisco's threat intelligence is continually updated with new

URLs, as well as new categories and risks for existing URLs, you can ensure that the system uses up-to-date information to filter requested URLs. Malicious sites that represent security threats such as malware, spam, botnets, and phishing may appear and disappear faster than you can update and deploy new policies.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguidev60/Access_Control_Rules__URL_Filtering.html

asked 10/10/2024
Eric Hebert
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first