<< Prev Question Next Question >>

Question 99/208

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (208q)
Question 1: With Cisco AMP for Endpoints, which option shows a list of a...
Question 2: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 3: Refer to the exhibit. The security engineer has configured c...
Question 4: Hotspot Questions (Exhibit) Which signature definition is vi...
Question 5: A network engineer wants to deploy a virtual cisco ESA and w...
Question 6: Which two routing options are valid with cisco firePOWER thr...
Question 7: Which two options are known limitations in deploying an IPS ...
Question 8: Over the period of one day, several Atomic ARP engine alerts...
Question 9: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 10: Which is the default IP address and admin port setting for h...
Question 11: When https traffic is scanned, which component of the full U...
Question 12: Which feature requires the network discovery policy for it t...
Question 13: What are two requirements for configuring a hybrid interface...
Question 14: When the WSA policy trace tool is used to make a request to ...
Question 15: Which statement about the Cisco ASA botnet traffic filter is...
Question 16: An engineer wants to improve web traffic performance by prox...
Question 17: Which settings are required when deploying Cisco IPS in high...
Question 18: Which Cisco technology combats viruses and malware with viru...
Question 19: Which three zones are used for anomaly detection? (Choose th...
Question 20: A Cisco Email Security Appliance uses which message filter t...
Question 21: When you deploy a sensor to send connection termination requ...
Question 22: An engineer wants to configure a method to verify the authen...
Question 23: Which two conditions must you configure in an event action o...
Question 24: What is a value that Cisco ESA can use for tracing mail flow...
Question 25: Which Cisco ASA object group type offers the most flexibilit...
Question 26: Refer to the exhibit, which description of the result of thi...
Question 27: A security engineer is configuring user identity for the Cis...
Question 28: Which option represents the cisco event aggregation product?...
Question 29: Which Cisco Cloud Web Security tool provides URL categorizat...
Question 30: A network engineer may use which three types of certificates...
Question 31: Which centralized reporting function of the Cisco Content Se...
Question 32: A system administrator wants to know if the email traffic fr...
Question 33: An enginner manages a Cisco Intrusion Prevention System via ...
Question 34: Which Option of SNMPv3 ensure authentication but no encrypti...
Question 35: (Exhibit)
Question 36: Your organization has subscribed to the Cisco Cloud Web Secu...
Question 37: Which Cisco FirePOWER setting is used to reduce thenumber of...
Question 38: What can Cisco Prime Security Manager (PRSM) be used to achi...
Question 39: Hotspot Questions (Exhibit) Which three statements about the...
Question 40: Which two options are the basic parts of a Snort rule? (Choo...
Question 41: When learning accept mode is set to auto, and the action is ...
Question 42: An engineer is configuring a cisco ESA and wants to control ...
Question 43: An engineer wants to cluster an existing ESA physical applia...
Question 44: Which two options are features of the Cisco Email Security A...
Question 45: An engineer is using the policy trace tool to troubleshoot a...
Question 46: Which policy must you edit to make changes to the Snort prep...
Question 47: Which Cisco AMP for Endpoints, what is meant by simple custo...
Question 48: Which step is required when you configure URL filtering to C...
Question 49: An engineer must deploy AMP with cloud protection. Which mac...
Question 50: What are three features of the Cisco Security Intellishield ...
Question 51: Refer to the exhibit. Which option is a result of this confi...
Question 52: What can you use to access the Cisco IPS secure command and ...
Question 53: Which action cloud reduce the security of the management int...
Question 54: What are the two policy types that can use a web reputation ...
Question 55: Elliptic curve cryptography is a stronger more efficient cry...
Question 56: In cisco Firepower 6.0, which policy contains the button tha...
Question 57: An engineer must architect an AMP private cloud deployment. ...
Question 58: Which two statements about Cisco Cloud Web Security function...
Question 59: Cisco AVC allows control of which three of the following? (C...
Question 60: Which two commands are valid URL filtering commands? (Choose...
Question 61: Which Cisco Cloud Web Security Connector feature allows acce...
Question 62: In the cisco email security appliance, which tool be used to...
Question 63: Which IPS feature allows you to aggregate multiple IPS links...
Question 64: Which four parameters must be defined in an ISAKMP policy wh...
Question 65: Which Cisco IPS CLI command shows the most fired signature?...
Question 66: Cisco's ASA CX includes which two URL categories? (Choose tw...
Question 67: Which Cisco WSA is intended for deployment in organizations ...
Question 68: How many interfaces can a Cisco ASA bridge group support and...
Question 69: When you create a new server profile on the Cisco ESA, which...
Question 70: Which Cisco ASA configuration command drops traffic if the C...
Question 71: In the predefined URL category filtering configuration page ...
Question 72: Which two types of software can be installed on a cisco ASA-...
Question 73: Which IPS signature regular expression CLI command matches a...
Question 74: (Exhibit)
Question 75: What is the default IP range of the external zone?...
Question 76: Which three access control actions permit traffic to pass th...
Question 77: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 78: Which two options are characteristics of router-based IPS? (...
Question 79: Which Cisco ESA predefined sender group uses parameter-match...
Question 80: In which two places can thresholding settings be configured?...
Question 81: Which Cisco WSA is intended for deployment in organizations ...
Question 82: A network administrator noticed all traffic that is redirect...
Question 83: Which type of policy is used to define the scope for applica...
Question 84: If inline-TCP-evasion-protection-mode on a Cisco IPS is set ...
Question 85: Which three administrator actions are used to configure IP l...
Question 86: Which Cisco technology is a customizable web-based alerting ...
Question 87: Hotspot Questions (Exhibit) To what extent will the Cisco IP...
Question 88: Which configuration option causes an ASA with IPS module to ...
Question 89: Which IPS engine detects ARP spoofing?...
Question 90: In cisco firePOWER 5.x and 6.0, which type of traffic causes...
Question 91: Which statement about the Cisco ASA CX role in inspecting SS...
Question 92: You ran the ssh generate-key command on the Cisco IPS and no...
Question 93: Which information does whoami command display in a WSA?...
Question 94: Which information does the show scansafe statistics command ...
Question 95: Which protocols can be specified in a Snort rule header for ...
Question 96: Using the Cisco WSA GUI, where should an operator navigate t...
Question 97: A Cisco Web Security Appliance's policy can provide visibili...
Question 98: Where in the Cisco ASA appliance CLI are Active/Active Failo...
Question 99: (Exhibit)
Question 100: Which two appliances support logical routed interfaces? (Cho...
Question 101: An IPS is configured to fail-closed and you observe that all...
Question 102: To enable the Cisco ASA Host Scan with remediation capabilit...
Question 103: A Cisco ASA requires an additional feature license to enable...
Question 104: What Event Action in an IPS signature is used to stop an att...
Question 105: Which CLI command is used to register a Cisco FirePOWER sens...
Question 106: When does the Cisco ASA send traffic to the Cisco ASA IPS mo...
Question 107: Within Cisco IPS anomaly detection, what is the default IP r...
Question 108: Which option lists the minimum requirements to deploy a mana...
Question 109: Which five system management protocols are supported by the ...
Question 110: Which object can be used on a Cisco FirePOWER appliance, but...
Question 111: Which type of interface do you configure to receive traffic ...
Question 112: (Exhibit)
Question 113: When deploying Cisco FirePOWER appliances, which option must...
Question 114: Which Cisco technology secures the network through malware f...
Question 115: Which Cisco ESA component receives connections from external...
Question 116: At which value do custom signatures begin?...
Question 117: With Cisco FirePOWER Threat Defense software, which interfac...
Question 118: Using the default modular policy framework global configurat...
Question 119: Which two pieces of information are required to implement tr...
Question 120: Refer to the exhibit. What type of password is "cisco"? Rout...
Question 121: What does the anomaly detection Cisco IOS IPS component dete...
Question 122: During initial configuration, the Cisco ASA can be configure...
Question 123: Which cloud-based malware detection engine uses machine-lear...
Question 124: Which Cisco technology prevents targeted malware attacks, pr...
Question 125: Using the Cisco WSA GUI, where should an operator navigate t...
Question 126: Which command allows the administrator to access the Cisco W...
Question 127: Refer to the exhibit. How is the "cisco" password stored? Ro...
Question 128: Which Cisco IPS deployment mode is best suited for bridged i...
Question 129: Which three functions can Cisco Application Visibility and C...
Question 130: Which option describes what occurs with asymmetric routing w...
Question 131: Which three options are valid event actions for a Cisco IPS?...
Question 132: Which option describes how the native VLAN is set up on an I...
Question 133: Which four statements are correct regarding management acces...
Question 134: (Exhibit)
Question 135: Lab Sim (Exhibit)
Question 136: Remote clients have reportted application slowness. The remo...
Question 137: How are HTTP requests handled by the Cisco WSA?...
Question 138: When creating an SSL policy on Cisco FirePOWER, which three ...
Question 139: (Exhibit)
Question 140: A customer is concerned with their employee`s internet usage...
Question 141: Refer to the exhibit. Which option describe the result of th...
Question 142: Which command verifies that the correct CWS license key info...
Question 143: Which two methods are used to deploy transparent mode traffi...
Question 144: On which plateforms can you run CWS connector? (choose two)...
Question 145: When using Cisco AMP for Networks, which feature copies a fi...
Question 146: Which description of an advantage of utilizing IPS virtual s...
Question 147: Hotspot Questions (Exhibit) What is the status of OS Identif...
Question 148: Which Cisco FirePOWER setting is used to reduce the number o...
Question 149: Access the configuration of the Cisco Email Security Applian...
Question 150: Which configuration mode enables a virtual sensor to monitor...
Question 151: After adding a remote-access IPsec tunnel via the VPN wizard...
Question 152: Which Cisco technology provides spam filtering and email pro...
Question 153: Which two tasks can the network discovery feature perform? (...
Question 154: What is the CLI command to create a new Message Filter in a ...
Question 155: During initial configuration, the Cisco ASA can be configure...
Question 156: Which Cisco Web Security Appliance design requires minimal c...
Question 157: What is the function of the Web Proxy Auto Discovery protoco...
Question 158: Which SSL traffic decryption feature is used when decrypting...
Question 159: (Exhibit)
Question 160: Which two Cisco IPS events will generate an IP log? (Choose ...
Question 161: Which statement about the default configuration of an IPS se...
Question 162: What is the function of the Cisco Context Adaptive Scanning ...
Question 163: What step is required to enable HTTPS Proxy on the Cisco Web...
Question 164: Which two TCP ports can allow the Cisco Firepower Management...
Question 165: Which action is possible when a signature is triggered on th...
Question 166: When a Cisco IPS is deployed in fail-closed mode, what are t...
Question 167: Which three statements about Cisco ASA CX are true? (Choose ...
Question 168: Which statement about the Cisco CWS web filtering policy beh...
Question 169: Which CLI command is used to generate firewall debug message...
Question 170: When a user receives an encrypted email from a Cisco ESA, wh...
Question 171: When using Cisco FirePOWFR Services for ASA, how is traffic ...
Question 172: Which option describes the role of the Learning Accept Mode ...
Question 173: Who or what calculates the signature fidelity rating?...
Question 174: Which two ports does the ISR G2 connector for CWS support re...
Question 175: Which method does Cisco recommend for collecting streams of ...
Question 176: Which command can change the HTTPS SSL method on the Cisco E...
Question 177: Which three statements about Cisco CWS are true? (Choose thr...
Question 178: Which option is a benefit of Cisco Email Security virtual ap...
Question 179: Which commands are required to configure SSH on router? (Cho...
Question 180: An engineer is configuring cisco ESA with a multilayer appro...
Question 181: Which command disables SSH access for administrators on the ...
Question 182: The Web Cache Communication Protocol (WCCP) is a content-rou...
Question 183: Which three user roles are partially defined by default in P...
Question 184: Which two conditions must you configure in an event action r...
Question 185: Which statement about Cisco ASA multicast routing support is...
Question 186: In a Cisco FirePOWER instrusion policy, which two event acti...
Question 187: With Cisco AMP for Endpoints on Windows, which three engines...
Question 188: Which Cisco AMP file disposition valid?...
Question 189: Which five system management protocols are supported by the ...
Question 190: An engineer is configuring a Cisco Email Security Appliance ...
Question 191: Which two routing options are valid with cisco firePOWER thr...
Question 192: When you configure the Cisco ESA to perform blacklisting, wh...
Question 193: Hotspot Questions (Exhibit) What action will the sensor take...
Question 194: Which Cisco technology is a modular security service that co...
Question 195: Which three pieces of information are required to implement ...
Question 196: Which two statement about Cisco Firepower file and intrusion...
Question 197: What is the default antispam policy for positively identifie...
Question 198: Which type of signature is generated by copying a default si...
Question 199: The Web Security Appliance has identities defined for facult...
Question 200: Which technique is deployed to harden network devices?...
Question 201: Which three operating systems are supported with Cisco AMP f...
Question 202: Which port is used for CLI Secure shell access?...
Question 203: On Cisco Firepower Management Center, which policy is used t...
Question 204: What is the authentication method for an encryption envelope...
Question 205: When you configure the Cisco ESA to perform blacklisting, wh...
Question 206: Hotspot Questions (Exhibit) Which two statements about Signa...
Question 207: What are two features of the Cisco ASA NGFW? (Choose two.)...
Question 208: Refer to the exhibit. (Exhibit) What are two facts about the...