<< Prev Question Next Question >>

Question 154/240

If learning accept mode is set to "auto" and the knowledge base is loaded only when explicitly requested on the IPS, which statement about the knowledge base is true?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (240q)
Question 1: Which description of an advantage of utilizing IPS virtual s...
Question 2: SIMULATION (Exhibit)
Question 3: Which technology is used to improve business-critical applic...
Question 4: Which two commands are valid URL filtering commands? (Choose...
Question 5: During initial configuration, the Cisco ASA can be configure...
Question 6: Which IPS feature allows you to aggregate multiple IPS links...
Question 7: Which command allows the administrator to access the Cisco W...
Question 8: What are the two policy types that can use a web reputation ...
Question 9: Refer to the exhibit. (Exhibit) When designing the network t...
Question 10: Which two benefits are provided by the dynamic dashboard in ...
Question 11: What does the anomaly detection Cisco IOS IPS component dete...
Question 12: Which Cisco Web Security Appliance design requires minimal c...
Question 13: Which Cisco technology provides spam filtering and email pro...
Question 14: Which two pieces of information are required to implement tr...
Question 15: Refer to the exhibit. (Exhibit) What CLI command generated t...
Question 16: What three alert notification options are available in Cisco...
Question 17: Which settings are required when deploying Cisco IPS in high...
Question 18: Refer to the exhibit. Which option describe the result of th...
Question 19: What are three arguments that can be used with the show cont...
Question 20: What is the access-list command on a Cisco IPS appliance use...
Question 21: Which two configuration steps are required for implementing ...
Question 22: Which three protocols are required when considering firewall...
Question 23: Which statement about the Cisco CWS web filtering policy beh...
Question 24: Which five system management and reporting protocols are sup...
Question 25: What is the default CX Management 0/0 IP address on a Cisco ...
Question 26: Which option represents the cisco event aggregation product?...
Question 27: Which three statements about threat ratings are true? (Choos...
Question 28: Within Cisco IPS anomaly detection, what is the default IP r...
Question 29: Which is the default IP address and admin port setting for h...
Question 30: Which three statements about Cisco CWS are true? (Choose thr...
Question 31: Refer to the exhibit. What type of password is "cisco"? (Exh...
Question 32: Which three statements about Cisco ASA CX are true? (Choose ...
Question 33: Which configuration mode enables a virtual sensor to monitor...
Question 34: For which task can PRSM be used?...
Question 35: What Event Action in an IPS signature is used to stop an att...
Question 36: Which two design considerations are required to add the Cisc...
Question 37: What is the function of the Web Proxy Auto-Discovery protoco...
Question 38: Which Cisco ESA predefined sender group uses parameter-match...
Question 39: When you deploy a sensor to send connection termination requ...
Question 40: Which commands are required to configure SSH on router? (Cho...
Question 41: What is a difference between a Cisco Content Security Manage...
Question 42: In order to set up HTTPS decryption on the Cisco Web Securit...
Question 43: What are three benefits of the Cisco AnyConnect Secure Mobil...
Question 44: (Exhibit) What action will the sensor take regarding IP addr...
Question 45: Which option is a benefit of Cisco hybrid email security?...
Question 46: Which Cisco Web Security Appliance feature enables the appli...
Question 47: Which three options are IPS signature classifications? (Choo...
Question 48: DRAG DROP Drag and drop the Cisco Security IntelliShield Ale...
Question 49: Cisco AVC allows control of which three of the following? (C...
Question 50: Which three sender reputation ranges identify the default be...
Question 51: What are the initial actions that can be performed on an inc...
Question 52: Which sensor deployment mode does Cisco recommend when inter...
Question 53: DRAG DROP Drag and drop the terms on the left onto the corre...
Question 54: Which signature engine is responsible for ICMP inspection on...
Question 55: What is the correct deployment for an IPS appliance in a net...
Question 56: Which IPS engine detects ARP spoofing?...
Question 57: Which step is required when you configure URL filtering to C...
Question 58: What are three features of the Cisco Security Intellishield ...
Question 59: Which two statements regarding the basic setup of the Cisco ...
Question 60: Using the Cisco WSA GUI, where should an operator navigate t...
Question 61: Which command can change the HTTPS SSL method on the Cisco E...
Question 62: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 63: Which option describes how the native VLAN is set up on an I...
Question 64: Which option describes what occurs with asymmetric routing w...
Question 65: Which type of signature is generated by copying a default si...
Question 66: What can Cisco Prime Security Manager (PRSM) be used to achi...
Question 67: With Cisco IDM, which rate limit option specifies the maximu...
Question 68: What is the authentication method for an encryption envelope...
Question 69: (Exhibit) Which two statements about Signature 1104 are true...
Question 70: Which port is used for CLI Secure shell access?...
Question 71: Which option is a benefit of deploying Cisco Application Vis...
Question 72: What is the default IP range of the external zone?...
Question 73: Which option is a benefit of Cisco Email Security virtual ap...
Question 74: What is the default antispam policy for positively identifie...
Question 75: Joe was asked to secure access to the Cisco Web Security App...
Question 76: An IPS is configured to fail-closed and you observe that all...
Question 77: What is a value that Cisco ESA can use for tracing mail flow...
Question 78: Which command establishes a virtual console session to a CX ...
Question 79: Which Cisco WSA is intended for deployment in organizations ...
Question 80: A user is deploying a Cisco IPS appliance in a data center t...
Question 81: Which five system management protocols are supported by the ...
Question 82: Which Cisco IPS deployment mode is best suited for bridged i...
Question 83: Refer to the exhibit. How is the "cisco" password stored? (E...
Question 84: What command alters the SSL ciphers used by the Cisco Email ...
Question 85: On which platforms can you run CWS connector? (Choose two)...
Question 86: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 87: Connections are being denied because of SenderBase Reputatio...
Question 88: Which two options are known limitations in deploying an IPS ...
Question 89: Which three zones are used for anomaly detection in a Cisco ...
Question 90: When a Cisco IPS is deployed in fail-closed mode, what are t...
Question 91: (Exhibit) What is the maximum message size that the Cisco Em...
Question 92: A Cisco Web Security Appliance's policy can provide visibili...
Question 93: Which two options are the correct URL and credentials used t...
Question 94: Which Cisco IOS command uses the default class map to limit ...
Question 95: Refer to the exhibit. (Exhibit) The system administrator of ...
Question 96: Which command applies WCCP redirection on the inside interfa...
Question 97: What is the CLI command to create a new Message Filter in a ...
Question 98: A network security design engineer is considering using a Ci...
Question 99: You have configured a VLAN pair that is connected to a switc...
Question 100: A system administrator wants to know if the email traffic fr...
Question 101: An ASA with an IPS module must be configured to drop traffic...
Question 102: When centralized message tracking is enabled on the Cisco ES...
Question 103: Which two Cisco IPS events will generate an IP log? (Choose ...
Question 104: Which three pieces of information are required to implement ...
Question 105: What is the function of the Cisco Context Adaptive Scanning ...
Question 106: Which information does the show scansafe statistics command ...
Question 107: In which way are packets handled when the IPS internal zone ...
Question 108: The Web Security Appliance has identities defined for facult...
Question 109: Which three functions can Cisco Application Visibility and C...
Question 110: Which Cisco WSA is intended for deployment in organizations ...
Question 111: Which Cisco technology combats viruses and malware with viru...
Question 112: Which Option of SNMPv3 ensure authentication but no encrypti...
Question 113: Which set of commands changes the FTP client timeout when th...
Question 114: What is a primary difference between the web security featur...
Question 115: Which version of AsyncOS for web is required to deploy the W...
Question 116: What are three best practices for a Cisco Intrusion Preventi...
Question 117: Which two statements about devices within a Cisco ESA cluste...
Question 118: What CLI command configures IP-based access to restrict GUI ...
Question 119: At which value do custom signatures begin?...
Question 120: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 121: When a user receives an encrypted email from a Cisco ESA, wh...
Question 122: Which method does Cisco recommend for collecting streams of ...
Question 123: (Exhibit) To what extent will the Cisco IPS sensor contribut...
Question 124: Which three search parameters are supported by the Email Sec...
Question 125: Which two statements about Cisco Cloud Web Security function...
Question 126: Which role does Passive Identity Management play in the Cisc...
Question 127: You ran the ssh generate-key command on the Cisco IPS and no...
Question 128: Which Cisco technology is a modular security service that co...
Question 129: Which antispam technology assumes that email from server A, ...
Question 130: The security team needs to limit the number of e-mails they ...
Question 131: (Exhibit) What is the status of OS Identification?...
Question 132: Which Cisco technology secures the network through malware f...
Question 133: Which Cisco technology prevents targeted malware attacks, pr...
Question 134: Which Cisco monitoring solution displays information and imp...
Question 135: How does a user access a Cisco Web Security Appliance for in...
Question 136: Which command verifies that CWS redirection is working on a ...
Question 137: A network engineer can assign IPS event action overrides to ...
Question 138: (Exhibit) The Cisco Email Security Appliance will reject mes...
Question 139: (Exhibit) Refer to the exhibit. What can be determined from ...
Question 140: Which Cisco Cloud Web Security Connector feature allows acce...
Question 141: Which three zones are used for anomaly detection? (Choose th...
Question 142: Refer to the exibit: (Exhibit)
Question 143: What is the default antispam policy for positively identifie...
Question 144: How are HTTP requests handled by the Cisco WSA?...
Question 145: What can you use to access the Cisco IPS secure command and ...
Question 146: Over the period of one day, several Atomic ARP engine alerts...
Question 147: A new Cisco IPS device has been placed on the network withou...
Question 148: Which type of server is required to communicate with a third...
Question 149: If inline-TCP-evasion-protection-mode on a Cisco IPS is set ...
Question 150: Which statement about the default configuration of an IPS se...
Question 151: Which action cloud reduce the security of the management int...
Question 152: Which technique is deployed to harden network devices?...
Question 153: Refer to the exhibit. (Exhibit) The system administrator of ...
Question 154: If learning accept mode is set to "auto" and the knowledge b...
Question 155: Which three features does Cisco CX provide? (Choose three.)...
Question 156: Which two practices are recommended for implementing NIPS at...
Question 157: Which Cisco ESA command is used to edit the ciphers that are...
Question 158: During initial configuration, the Cisco ASA can be configure...
Question 159: Which two conditions must you configure in an event action o...
Question 160: Cisco's ASA CX includes which two URL categories? (Choose tw...
Question 161: Elliptic curve cryptography is a stronger more efficient cry...
Question 162: What is a valid search parameter for the Cisco ESA find even...
Question 163: DRAG DROP Drag and drop the steps on the left into the corre...
Question 164: What step is required to enable HTTPS Proxy on the Cisco Web...
Question 165: Which three user roles are partially defined by default in P...
Question 166: Which two statements about Cisco ESA clusters are true? (Cho...
Question 167: Which two options are features of the Cisco Email Security A...
Question 168: SIMULATION (Exhibit)
Question 169: Which solution must a customer deploy to prioritize traffic ...
Question 170: Which option describes a customer benefit of the Cisco Secur...
Question 171: Which configuration option causes an ASA with IPS module to ...
Question 172: Which Cisco technology is a customizable web-based alerting ...
Question 173: Who or what calculates the signature fidelity rating?...
Question 174: (Exhibit) What is the maximum number of recipients per hour ...
Question 175: Which Cisco IPS CLI command shows the most fired signature?...
Question 176: Which Cisco Cloud Web Security tool provides URL categorizat...
Question 177: Who or what calculates the signature fidelity rating in a Ci...
Question 178: Which action is possible when a signature is triggered on th...
Question 179: Which three categories of the seven major risk management ca...
Question 180: Which command verifies that the correct CWS license key info...
Question 181: Which option describes the role of the Learning Accept Mode ...
Question 182: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 183: SIMULATION (Exhibit)
Question 184: Which command disables SSH access for administrators on the ...
Question 185: Which five system management protocols are supported by the ...
Question 186: Refer to the exhibit. (Exhibit) Which four rows exhibit the ...
Question 187: Which IPS signature engine inspects the IP protocol packets ...
Question 188: Refer to the exhibit. (Exhibit) What Cisco ESA CLI command g...
Question 189: Which two commands are used to verify that CWS redirection i...
Question 190: Which two GUI options display users' activity in Cisco Web S...
Question 191: Which statement about Cisco IPS Manager Express is true?...
Question 192: The helpdesk was asked to provide a record of delivery for a...
Question 193: Refer to the exhibit. (Exhibit) What are two facts about the...
Question 194: A security engineer is configuring user identity for the Cis...
Question 195: (Exhibit) What is the maximum number of recipients per hour ...
Question 196: In addition to the CLI, what is another option to manage a C...
Question 197: Which command is used to enable strong ciphers on the Cisco ...
Question 198: Refer to the exhibit. The security engineer has configured c...
Question 199: Which three options are valid event actions for a Cisco IPS?...
Question 200: DRAG DROP Drag and drop the steps on the left into the corre...
Question 201: Which Cisco ESA component receives connections from external...
Question 202: When you create a new server profile on the Cisco ESA, which...
Question 203: (Exhibit) For which domains will the Cisco Email Security Ap...
Question 204: (Exhibit) What is the maximum message size that the Cisco Em...
Question 205: When learning accept mode is set to auto, and the action is ...
Question 206: Which four statements are correct regarding management acces...
Question 207: What are two benefits of using SPAN with promiscuous mode de...
Question 208: Which feature does Acceptable Use Controls use to implement ...
Question 209: Which platform has message tracking enabled by default?...
Question 210: Which Cisco Security IntelliShield Alert Manager Service com...
Question 211: When you configure the Cisco ESA to perform blacklisting, wh...
Question 212: What are two features of the Cisco ASA NGFW? (Choose two.)...
Question 213: Which command sets the number of packets to log on a Cisco I...
Question 214: (Exhibit) For which domains will the Cisco Email Security Ap...
Question 215: A new Cisco IPS device has been placed on the network withou...
Question 216: When https traffic is scanned, which component of the full U...
Question 217: Which four methods are used to deploy transparent mode traff...
Question 218: When does the Cisco ASA send traffic to the Cisco ASA IPS mo...
Question 219: Which website can be used to validate group information abou...
Question 220: Refer to the exhibit. Which description of the result of thi...
Question 221: When a Cisco Email Security Appliance joins a cluster, which...
Question 222: Which centralized reporting function of the Cisco Content Se...
Question 223: Which three administrator actions are used to configure IP l...
Question 224: Which three options are characteristics of router-based IPS?...
Question 225: Which IPS signature regular expression CLI command matches a...
Question 226: Which feature of the Cisco Hybrid Email Security services en...
Question 227: Which piece of information is required to perform a policy t...
Question 228: An engineer manages a Cisco Intrusion Prevention System via ...
Question 229: Which two conditions must you configure in an event action r...
Question 230: An ASA with an IPS module must be configured to drop traffic...
Question 231: (Exhibit) The Cisco Email Security Appliance will reject mes...
Question 232: A Cisco Email Security Appliance uses which message filter t...
Question 233: A network engineer may use which three types of certificates...
Question 234: (Exhibit) Which signature definition is virtual sensor 0 ass...
Question 235: Which interface on the Cisco Email Security Appliance has HT...
Question 236: You ran the ssh generate-key command on the Cisco IPS and no...
Question 237: (Exhibit) Which three statements about the Cisco IPS applian...
Question 238: Which Cisco Web Security Appliance deployment mode requires ...
Question 239: Which two options are characteristics of router-based IPS? (...
Question 240: Which statement about the Cisco ASA CX role in inspecting SS...