Multifactor authentication enhances security by requiring:
Correct Answer: D
Question 47
Benefits of using visibility and logging tools like SIEM include:
Correct Answer: B,D
Question 48
The final step in handling a security incident, after containment and remediation, is to _________ the affected systems or applications to their normal state.
Correct Answer: C
Question 49
Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual machine to the on-premises mail server. All other connections from the virtual machine to the mail server must be blocked. The indicated rules were applied to the firewall; however, the virtual machine cannot access the mail server. Which two actions should be performed on the firewall to meet the requirement? (Choose two.)
Correct Answer: A,D
From the firewall access rules provided, Rule 1 allows traffic from 20.1.1.10 (GCP VM) to 20.1.1.1 using HTTPS. However, this destination is not the actual mail server-the mail server resides at 192.168.200.10 (inside network). Therefore: A: Rule 1 must be updated to reflect the correct destination: 192.168.200.10. Without this change, traffic is not permitted to the mail server. D: NAT (Network Address Translation) is needed to translate the external address (e.g., 20.1.1.10) to access internal addresses (like 192.168.200.10). As per SCAZT and Cisco firewall policies, NAT enables proper packet delivery from public to private zones. Rule 2, which denies all other traffic, is correctly placed after the specific allow rule. Therefore, moving it (Option B) would not help, and Options C and E are unrelated to resolving the immediate firewall access and routing issue. Reference: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT), Section 3: Network and Cloud Security, Pages 72-77
Question 50
Endpoint posture policies are implemented to ensure that: