A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure
Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying
common passwords across many accounts. The attack poses a significant security threat to the
organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize
the risk of similar attacks in the future, the IT security team must implement effective mitigation
measures. Which technique effectively reduces the risk of this type of attack?
Question No 2
A product manager is focused on maintaining the security integrity of a microservice - based
application as new features are developed and integrated. To ensure that known software
vulnerabilities are not introduced into the product, it is crucial to implement a robust application
security technique. The technique must be applied during the build phase of the software
development lifecycle, which allows the team to proactively identify and address vulnerability risks
before deployment. Which application security technique must be applied to accomplish the goal?
Question No 3
A financial company is in the process of upgrading network access across the entire company. The
solution must ensure least privilege access control access across different network segments and
increased security for employees. Which solution approach must the company take?
Question No 4
A security engineer on an application design team must choose a framework of attack patterns to
evaluate during threat modeling. Which framework provides the common set of attacks?
Question No 5
A manufacturing company implemented IoT devices throughout their smart factory and needs a
security solution that meets these requirements
Protect IoT devices from network - based attacks.
Visibility into communication patterns.
Anomaly detection for IoT traffic.
Which firewall technology or feature should be recommended?