After a recent security breach, a financial company is reassessing their overall security posture and
strategy to better protect sensitive data and resources. The company already deployed on-premises
next-generation firewalls at the network edge for each branch location. Security measures must be
enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic
filtering directly on endpoint devices, thereby offering another layer of defense against potential
threats. Which technology must be implemented to meet the requirement?
After a recent security breach, a financial company is reassessing their overall security posture and
strategy to better protect sensitive data and resources. The company already deployed on-premises
next-generation firewalls at the network edge for each branch location. Security measures must be
enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic
filtering directly on endpoint devices, thereby offering another layer of defense against potential
threats. Which technology must be implemented to meet the requirement?
A global hotel chain is using Cisco ISE and Cisco switches to manage the network. The hotel company
wants to enhance network security by segmenting users and endpoints. The company must ensure
that devices within the same VLAN cannot communicate with each other. The goal is to prevent
cross-communication without the use of dynamic access control lists. Which action must be taken
using Cisco ISE to meet the requirement?
In preparation for an upcoming security audit, a metal production company decided to enhance the
security of container-based services running in a Kubernetes environment. The company wants to
ensure that all communications between applications and services are encrypted. The administrator
plans to implement mTLS service between application and services to secure the data exchanges.
Given the need to manage encryption at scale and maintain efficient communication across the
cluster, which network transport technology must be employed?