A. Firewalls logs for monitoring application traffic
B. Both A and B
C. Non-technical assessments without data analysis
D. Cisco Secure Workload for dynamic security policy enforcement
A. Limited log storage
B. Decrease in operational efficiency
C. Real-time analysis of security alerts generated by applications and network hardware
D. Reduction in data analysis capabilities
A. encrypt
B. are
C. delete
D. forget
A. VPNs
B. antivirus software
C. firewalls
D. SAML/SSO
A. Reducing visibility into workload communications
B. Implementing microsegmentation to protect against lateral movement
C. Ignoring changes in the threat landscape
D. Enforcing security policies dynamically based on workload behavior
A. Directly exposing internal network architecture to the internet
B. Slowing down the access to web services
C. Acting as an intermediary for requests from clients seeking resources from servers
D. Decreasing the security of web applications
A. Simplify attacks on network infrastructure
B. Enhance visibility into security and network events for better incident analysis
C. Focus solely on external threat actors while ignoring insider threats
D. Decrease the storage of logs and analytics data
A. Preventing data exfiltration and limiting malware spread
B. Simplifying network configuration
C. Enhancing the performance of cloud applications
D. Allowing unrestricted data transfer
A. escalate
B. exacerbate
C. remediate
D. overlook
A. Load balancing, SSL encryption, and protection from attacks
B. Directly exposing application APIs to the public internet
C. Simplifying the architecture by removing the need for WAF
D. Increasing the visibility of backend servers to external threats