<< Prev Question Next Question >>

Question 90/240

When a Cisco IPS is deployed in fail-closed mode, what are two conditions that can result in traffic being dropped? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (240q)
Question 1: Which description of an advantage of utilizing IPS virtual s...
Question 2: SIMULATION (Exhibit)
Question 3: Which technology is used to improve business-critical applic...
Question 4: Which two commands are valid URL filtering commands? (Choose...
Question 5: During initial configuration, the Cisco ASA can be configure...
Question 6: Which IPS feature allows you to aggregate multiple IPS links...
Question 7: Which command allows the administrator to access the Cisco W...
Question 8: What are the two policy types that can use a web reputation ...
Question 9: Refer to the exhibit. (Exhibit) When designing the network t...
Question 10: Which two benefits are provided by the dynamic dashboard in ...
Question 11: What does the anomaly detection Cisco IOS IPS component dete...
Question 12: Which Cisco Web Security Appliance design requires minimal c...
Question 13: Which Cisco technology provides spam filtering and email pro...
Question 14: Which two pieces of information are required to implement tr...
Question 15: Refer to the exhibit. (Exhibit) What CLI command generated t...
Question 16: What three alert notification options are available in Cisco...
Question 17: Which settings are required when deploying Cisco IPS in high...
Question 18: Refer to the exhibit. Which option describe the result of th...
Question 19: What are three arguments that can be used with the show cont...
Question 20: What is the access-list command on a Cisco IPS appliance use...
Question 21: Which two configuration steps are required for implementing ...
Question 22: Which three protocols are required when considering firewall...
Question 23: Which statement about the Cisco CWS web filtering policy beh...
Question 24: Which five system management and reporting protocols are sup...
Question 25: What is the default CX Management 0/0 IP address on a Cisco ...
Question 26: Which option represents the cisco event aggregation product?...
Question 27: Which three statements about threat ratings are true? (Choos...
Question 28: Within Cisco IPS anomaly detection, what is the default IP r...
Question 29: Which is the default IP address and admin port setting for h...
Question 30: Which three statements about Cisco CWS are true? (Choose thr...
Question 31: Refer to the exhibit. What type of password is "cisco"? (Exh...
Question 32: Which three statements about Cisco ASA CX are true? (Choose ...
Question 33: Which configuration mode enables a virtual sensor to monitor...
Question 34: For which task can PRSM be used?...
Question 35: What Event Action in an IPS signature is used to stop an att...
Question 36: Which two design considerations are required to add the Cisc...
Question 37: What is the function of the Web Proxy Auto-Discovery protoco...
Question 38: Which Cisco ESA predefined sender group uses parameter-match...
Question 39: When you deploy a sensor to send connection termination requ...
Question 40: Which commands are required to configure SSH on router? (Cho...
Question 41: What is a difference between a Cisco Content Security Manage...
Question 42: In order to set up HTTPS decryption on the Cisco Web Securit...
Question 43: What are three benefits of the Cisco AnyConnect Secure Mobil...
Question 44: (Exhibit) What action will the sensor take regarding IP addr...
Question 45: Which option is a benefit of Cisco hybrid email security?...
Question 46: Which Cisco Web Security Appliance feature enables the appli...
Question 47: Which three options are IPS signature classifications? (Choo...
Question 48: DRAG DROP Drag and drop the Cisco Security IntelliShield Ale...
Question 49: Cisco AVC allows control of which three of the following? (C...
Question 50: Which three sender reputation ranges identify the default be...
Question 51: What are the initial actions that can be performed on an inc...
Question 52: Which sensor deployment mode does Cisco recommend when inter...
Question 53: DRAG DROP Drag and drop the terms on the left onto the corre...
Question 54: Which signature engine is responsible for ICMP inspection on...
Question 55: What is the correct deployment for an IPS appliance in a net...
Question 56: Which IPS engine detects ARP spoofing?...
Question 57: Which step is required when you configure URL filtering to C...
Question 58: What are three features of the Cisco Security Intellishield ...
Question 59: Which two statements regarding the basic setup of the Cisco ...
Question 60: Using the Cisco WSA GUI, where should an operator navigate t...
Question 61: Which command can change the HTTPS SSL method on the Cisco E...
Question 62: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 63: Which option describes how the native VLAN is set up on an I...
Question 64: Which option describes what occurs with asymmetric routing w...
Question 65: Which type of signature is generated by copying a default si...
Question 66: What can Cisco Prime Security Manager (PRSM) be used to achi...
Question 67: With Cisco IDM, which rate limit option specifies the maximu...
Question 68: What is the authentication method for an encryption envelope...
Question 69: (Exhibit) Which two statements about Signature 1104 are true...
Question 70: Which port is used for CLI Secure shell access?...
Question 71: Which option is a benefit of deploying Cisco Application Vis...
Question 72: What is the default IP range of the external zone?...
Question 73: Which option is a benefit of Cisco Email Security virtual ap...
Question 74: What is the default antispam policy for positively identifie...
Question 75: Joe was asked to secure access to the Cisco Web Security App...
Question 76: An IPS is configured to fail-closed and you observe that all...
Question 77: What is a value that Cisco ESA can use for tracing mail flow...
Question 78: Which command establishes a virtual console session to a CX ...
Question 79: Which Cisco WSA is intended for deployment in organizations ...
Question 80: A user is deploying a Cisco IPS appliance in a data center t...
Question 81: Which five system management protocols are supported by the ...
Question 82: Which Cisco IPS deployment mode is best suited for bridged i...
Question 83: Refer to the exhibit. How is the "cisco" password stored? (E...
Question 84: What command alters the SSL ciphers used by the Cisco Email ...
Question 85: On which platforms can you run CWS connector? (Choose two)...
Question 86: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 87: Connections are being denied because of SenderBase Reputatio...
Question 88: Which two options are known limitations in deploying an IPS ...
Question 89: Which three zones are used for anomaly detection in a Cisco ...
Question 90: When a Cisco IPS is deployed in fail-closed mode, what are t...
Question 91: (Exhibit) What is the maximum message size that the Cisco Em...
Question 92: A Cisco Web Security Appliance's policy can provide visibili...
Question 93: Which two options are the correct URL and credentials used t...
Question 94: Which Cisco IOS command uses the default class map to limit ...
Question 95: Refer to the exhibit. (Exhibit) The system administrator of ...
Question 96: Which command applies WCCP redirection on the inside interfa...
Question 97: What is the CLI command to create a new Message Filter in a ...
Question 98: A network security design engineer is considering using a Ci...
Question 99: You have configured a VLAN pair that is connected to a switc...
Question 100: A system administrator wants to know if the email traffic fr...
Question 101: An ASA with an IPS module must be configured to drop traffic...
Question 102: When centralized message tracking is enabled on the Cisco ES...
Question 103: Which two Cisco IPS events will generate an IP log? (Choose ...
Question 104: Which three pieces of information are required to implement ...
Question 105: What is the function of the Cisco Context Adaptive Scanning ...
Question 106: Which information does the show scansafe statistics command ...
Question 107: In which way are packets handled when the IPS internal zone ...
Question 108: The Web Security Appliance has identities defined for facult...
Question 109: Which three functions can Cisco Application Visibility and C...
Question 110: Which Cisco WSA is intended for deployment in organizations ...
Question 111: Which Cisco technology combats viruses and malware with viru...
Question 112: Which Option of SNMPv3 ensure authentication but no encrypti...
Question 113: Which set of commands changes the FTP client timeout when th...
Question 114: What is a primary difference between the web security featur...
Question 115: Which version of AsyncOS for web is required to deploy the W...
Question 116: What are three best practices for a Cisco Intrusion Preventi...
Question 117: Which two statements about devices within a Cisco ESA cluste...
Question 118: What CLI command configures IP-based access to restrict GUI ...
Question 119: At which value do custom signatures begin?...
Question 120: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 121: When a user receives an encrypted email from a Cisco ESA, wh...
Question 122: Which method does Cisco recommend for collecting streams of ...
Question 123: (Exhibit) To what extent will the Cisco IPS sensor contribut...
Question 124: Which three search parameters are supported by the Email Sec...
Question 125: Which two statements about Cisco Cloud Web Security function...
Question 126: Which role does Passive Identity Management play in the Cisc...
Question 127: You ran the ssh generate-key command on the Cisco IPS and no...
Question 128: Which Cisco technology is a modular security service that co...
Question 129: Which antispam technology assumes that email from server A, ...
Question 130: The security team needs to limit the number of e-mails they ...
Question 131: (Exhibit) What is the status of OS Identification?...
Question 132: Which Cisco technology secures the network through malware f...
Question 133: Which Cisco technology prevents targeted malware attacks, pr...
Question 134: Which Cisco monitoring solution displays information and imp...
Question 135: How does a user access a Cisco Web Security Appliance for in...
Question 136: Which command verifies that CWS redirection is working on a ...
Question 137: A network engineer can assign IPS event action overrides to ...
Question 138: (Exhibit) The Cisco Email Security Appliance will reject mes...
Question 139: (Exhibit) Refer to the exhibit. What can be determined from ...
Question 140: Which Cisco Cloud Web Security Connector feature allows acce...
Question 141: Which three zones are used for anomaly detection? (Choose th...
Question 142: Refer to the exibit: (Exhibit)
Question 143: What is the default antispam policy for positively identifie...
Question 144: How are HTTP requests handled by the Cisco WSA?...
Question 145: What can you use to access the Cisco IPS secure command and ...
Question 146: Over the period of one day, several Atomic ARP engine alerts...
Question 147: A new Cisco IPS device has been placed on the network withou...
Question 148: Which type of server is required to communicate with a third...
Question 149: If inline-TCP-evasion-protection-mode on a Cisco IPS is set ...
Question 150: Which statement about the default configuration of an IPS se...
Question 151: Which action cloud reduce the security of the management int...
Question 152: Which technique is deployed to harden network devices?...
Question 153: Refer to the exhibit. (Exhibit) The system administrator of ...
Question 154: If learning accept mode is set to "auto" and the knowledge b...
Question 155: Which three features does Cisco CX provide? (Choose three.)...
Question 156: Which two practices are recommended for implementing NIPS at...
Question 157: Which Cisco ESA command is used to edit the ciphers that are...
Question 158: During initial configuration, the Cisco ASA can be configure...
Question 159: Which two conditions must you configure in an event action o...
Question 160: Cisco's ASA CX includes which two URL categories? (Choose tw...
Question 161: Elliptic curve cryptography is a stronger more efficient cry...
Question 162: What is a valid search parameter for the Cisco ESA find even...
Question 163: DRAG DROP Drag and drop the steps on the left into the corre...
Question 164: What step is required to enable HTTPS Proxy on the Cisco Web...
Question 165: Which three user roles are partially defined by default in P...
Question 166: Which two statements about Cisco ESA clusters are true? (Cho...
Question 167: Which two options are features of the Cisco Email Security A...
Question 168: SIMULATION (Exhibit)
Question 169: Which solution must a customer deploy to prioritize traffic ...
Question 170: Which option describes a customer benefit of the Cisco Secur...
Question 171: Which configuration option causes an ASA with IPS module to ...
Question 172: Which Cisco technology is a customizable web-based alerting ...
Question 173: Who or what calculates the signature fidelity rating?...
Question 174: (Exhibit) What is the maximum number of recipients per hour ...
Question 175: Which Cisco IPS CLI command shows the most fired signature?...
Question 176: Which Cisco Cloud Web Security tool provides URL categorizat...
Question 177: Who or what calculates the signature fidelity rating in a Ci...
Question 178: Which action is possible when a signature is triggered on th...
Question 179: Which three categories of the seven major risk management ca...
Question 180: Which command verifies that the correct CWS license key info...
Question 181: Which option describes the role of the Learning Accept Mode ...
Question 182: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 183: SIMULATION (Exhibit)
Question 184: Which command disables SSH access for administrators on the ...
Question 185: Which five system management protocols are supported by the ...
Question 186: Refer to the exhibit. (Exhibit) Which four rows exhibit the ...
Question 187: Which IPS signature engine inspects the IP protocol packets ...
Question 188: Refer to the exhibit. (Exhibit) What Cisco ESA CLI command g...
Question 189: Which two commands are used to verify that CWS redirection i...
Question 190: Which two GUI options display users' activity in Cisco Web S...
Question 191: Which statement about Cisco IPS Manager Express is true?...
Question 192: The helpdesk was asked to provide a record of delivery for a...
Question 193: Refer to the exhibit. (Exhibit) What are two facts about the...
Question 194: A security engineer is configuring user identity for the Cis...
Question 195: (Exhibit) What is the maximum number of recipients per hour ...
Question 196: In addition to the CLI, what is another option to manage a C...
Question 197: Which command is used to enable strong ciphers on the Cisco ...
Question 198: Refer to the exhibit. The security engineer has configured c...
Question 199: Which three options are valid event actions for a Cisco IPS?...
Question 200: DRAG DROP Drag and drop the steps on the left into the corre...
Question 201: Which Cisco ESA component receives connections from external...
Question 202: When you create a new server profile on the Cisco ESA, which...
Question 203: (Exhibit) For which domains will the Cisco Email Security Ap...
Question 204: (Exhibit) What is the maximum message size that the Cisco Em...
Question 205: When learning accept mode is set to auto, and the action is ...
Question 206: Which four statements are correct regarding management acces...
Question 207: What are two benefits of using SPAN with promiscuous mode de...
Question 208: Which feature does Acceptable Use Controls use to implement ...
Question 209: Which platform has message tracking enabled by default?...
Question 210: Which Cisco Security IntelliShield Alert Manager Service com...
Question 211: When you configure the Cisco ESA to perform blacklisting, wh...
Question 212: What are two features of the Cisco ASA NGFW? (Choose two.)...
Question 213: Which command sets the number of packets to log on a Cisco I...
Question 214: (Exhibit) For which domains will the Cisco Email Security Ap...
Question 215: A new Cisco IPS device has been placed on the network withou...
Question 216: When https traffic is scanned, which component of the full U...
Question 217: Which four methods are used to deploy transparent mode traff...
Question 218: When does the Cisco ASA send traffic to the Cisco ASA IPS mo...
Question 219: Which website can be used to validate group information abou...
Question 220: Refer to the exhibit. Which description of the result of thi...
Question 221: When a Cisco Email Security Appliance joins a cluster, which...
Question 222: Which centralized reporting function of the Cisco Content Se...
Question 223: Which three administrator actions are used to configure IP l...
Question 224: Which three options are characteristics of router-based IPS?...
Question 225: Which IPS signature regular expression CLI command matches a...
Question 226: Which feature of the Cisco Hybrid Email Security services en...
Question 227: Which piece of information is required to perform a policy t...
Question 228: An engineer manages a Cisco Intrusion Prevention System via ...
Question 229: Which two conditions must you configure in an event action r...
Question 230: An ASA with an IPS module must be configured to drop traffic...
Question 231: (Exhibit) The Cisco Email Security Appliance will reject mes...
Question 232: A Cisco Email Security Appliance uses which message filter t...
Question 233: A network engineer may use which three types of certificates...
Question 234: (Exhibit) Which signature definition is virtual sensor 0 ass...
Question 235: Which interface on the Cisco Email Security Appliance has HT...
Question 236: You ran the ssh generate-key command on the Cisco IPS and no...
Question 237: (Exhibit) Which three statements about the Cisco IPS applian...
Question 238: Which Cisco Web Security Appliance deployment mode requires ...
Question 239: Which two options are characteristics of router-based IPS? (...
Question 240: Which statement about the Cisco ASA CX role in inspecting SS...