<< Prev Question Next Question >>

Question 167/217

Which Cisco technology combats viruses and malware with virus outbreak filters that are downloaded from Cisco SenderBase?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (217q)
Question 1: Which Cisco Web Security Appliance design requires minimal c...
Question 2: Which three sender reputation ranges identify the default be...
Question 3: Which Cisco IOS command uses the default class map to limit ...
Question 4: With Firepower Threat Defense, which two interface settings ...
Question 5: Which policy must you edit to make changes to the Snort prep...
Question 6: When using Cisco AMP for Networks, which feature copies a fi...
Question 7: Using the Cisco WSA GUI, where should an operator navigate t...
Question 8: You have configured a VLAN pair that is connected to a switc...
Question 9: Which four statements are correct regarding management acces...
Question 10: Which Cisco WSA is intended for deployment in organizations ...
Question 11: What can Cisco Prime Security Manager (PRSM) be used to achi...
Question 12: Which antispam technology assumes that email from server A, ...
Question 13: Which Cisco ESA component receives connections from external...
Question 14: Elliptic curve cryptography is a stronger more efficient cry...
Question 15: Which command is used to enable strong ciphers on the Cisco ...
Question 16: Which option lists the minimum requirements to deploy a mana...
Question 17: What is the CLI command to create a new Message Filter in a ...
Question 18: Which three statements about threat ratings are true? (Choos...
Question 19: Which Cisco ESA command is used to edit the ciphers that are...
Question 20: Which two are valid suppression types on a Cisco Next Genera...
Question 21: An ASA with an IPS module must be configured to drop traffic...
Question 22: Which configuration mode enables a virtual sensor to monitor...
Question 23: On Cisco Firepower Management Center, which policy is used t...
Question 24: What is the default IP range of the external zone?...
Question 25: An engineer wants to configure a method to verify the authen...
Question 26: In order to set up HTTPS decryption on the Cisco Web Securit...
Question 27: Which statement about the Cisco ASA CX role in inspecting SS...
Question 28: (Exhibit) Which three statements about the Cisco IPS applian...
Question 29: Which signature engine is responsible for ICMP inspection on...
Question 30: In the predefined URL category filtering configuration page ...
Question 31: A network engineer can assign IPS event action overrides to ...
Question 32: With Cisco AMP for Endpoints, what is meant by simple custom...
Question 33: Which Cisco technology prevents targeted malware attacks, pr...
Question 34: (Exhibit) To what extent will the Cisco IPS sensor contribut...
Question 35: At which value do custom signatures begin?...
Question 36: Which action is possible when a signature is triggered on th...
Question 37: A new Cisco IPS device has been placed on the network withou...
Question 38: When learning accept mode is set to auto, and the action is ...
Question 39: Which statement regarding hashing is correct?...
Question 40: Which two methods are used to deploy transparent mode traffi...
Question 41: With Cisco FirePOWER Threat Defense software, which interfac...
Question 42: Which interface type allows packets to be dropped?...
Question 43: The helpdesk was asked to provide a record of delivery for a...
Question 44: Which Cisco AMP for Endpoints, what is meant by simple custo...
Question 45: Which version of AsyncOS for web is required to deploy the W...
Question 46: Which type of server is required to communicate with a third...
Question 47: Which technique is deployed to harden network devices?...
Question 48: Which command verifies that the correct CWS license key info...
Question 49: Which two statements about Cisco Cloud Web Security function...
Question 50: A Cisco Web Security Appliance's policy can provide visibili...
Question 51: Which Cisco ASA configuration command drops traffic if the C...
Question 52: Refer to the exhibit. What CLI command generated the output?...
Question 53: Which three statements about Cisco CWS are true? (Choose thr...
Question 54: Which two routing options are valid with cisco firePOWER thr...
Question 55: Which are two requirements for configuration a routed interf...
Question 56: Joe was asked to secure access to the Cisco Web Security App...
Question 57: Which Cisco Advanced Malware Protection for Endpoints deploy...
Question 58: Which type of signature is generated by copying a default si...
Question 59: Which action cloud reduce the security of the management int...
Question 60: Which option lists the minimum requirements to deploy a mana...
Question 61: Which type of policy do you configure if you want to look fo...
Question 62: What command alters the SSL ciphers used by the Cisco Email ...
Question 63: A Cisco Email Security Appliance uses which message filter t...
Question 64: Which two health modules are available within the Firepower ...
Question 65: Which two types of software can be installed on a cisco ASA-...
Question 66: Which two types of digital certificate enrollment processes ...
Question 67: When attempting to tunnel FTP traffic through a stateful fir...
Question 68: Over the period of one day, several Atomic ARP engine alerts...
Question 69: An engineer is using the policy trace tool to troubleshoot a...
Question 70: What is a primary difference between the web security featur...
Question 71: Refer to the exhibit. The security engineer has configured c...
Question 72: Which port is used for CLI Secure shell access?...
Question 73: Which Cisco monitoring solution displays information and imp...
Question 74: Troubleshoot command for NGIPSv, i chose the first one. I th...
Question 75: Which statement about the Cisco CWS web filtering policy beh...
Question 76: Which feature does Acceptable Use Controls use to implement ...
Question 77: Which two practices are recommended for implementing NIPS at...
Question 78: Which standby protocol works on NGIPS but not on CWS?...
Question 79: Cisco AVC allows control of which three of the following? (C...
Question 80: What is the access-list command on a Cisco IPS appliance use...
Question 81: Which website can be used to validate group information abou...
Question 82: What are three benefits of the Cisco AnyConnect Secure Mobil...
Question 83: What step is required to enable HTTPS Proxy on the Cisco Web...
Question 84: In cisco firePOWER 5.x and 6.0, which type of traffic causes...
Question 85: Which three statements concerning keystroke logger detection...
Question 86: In cisco Firepower 6.0, which policy contains the button tha...
Question 87: Which three search parameters are supported by the Email Sec...
Question 88: Standby protocol which works on NGIPS but not on CWS?...
Question 89: Which two options are application layer preprocessors? (Choo...
Question 90: What are three best practices for a Cisco Intrusion Preventi...
Question 91: Which five system management protocols are supported by the ...
Question 92: Which Cisco technology is a modular security service that co...
Question 93: The security team needs to limit the number of e-mails they ...
Question 94: Which two TCP ports can allow the Cisco Firepower Management...
Question 95: Which command applies WCCP redirection on the inside interfa...
Question 96: When https traffic is scanned, which component of the full U...
Question 97: Which three webtype ACL statements are correct? (Choose thre...
Question 98: An engineer is configuring a cisco ESA and wants to control ...
Question 99: Which IPS signature engine inspects the IP protocol packets ...
Question 100: What are the two policy types that can use a web reputation ...
Question 101: Which three options are characteristics of router-based IPS?...
Question 102: When deploying Cisco FirePOWER appliances, which option must...
Question 103: Which two statements about devices within a Cisco ESA cluste...
Question 104: Which action inspects packets in IPS?...
Question 105: Which Cisco technology is a customizable web-based alerting ...
Question 106: SIMULATION Instructions: Click the grey buttons of this fram...
Question 107: Which description of an advantage of utilizing IPS virtual s...
Question 108: Which method does Cisco recommend for collecting streams of ...
Question 109: Which two ports does the ISR G2 connector for CWS support re...
Question 110: To enable the Cisco ASA Host Scan with remediation capabilit...
Question 111: Which Cisco Cloud Web Security tool provides URL categorizat...
Question 112: Which commands are required to configure SSH on router? (Cho...
Question 113: What are two features of the Cisco ASA NGFW? (Choose two.)...
Question 114: With Cisco FirePOWER Threat Defense software, which interfac...
Question 115: With Cisco IDM, which rate limit option specifies the maximu...
Question 116: (Exhibit) Which two statements about Signature 1104 are true...
Question 117: Who or what calculates the signature fidelity rating?...
Question 118: Which piece of information required to perform a policy trac...
Question 119: Which Cisco ASA SSL VPN feature provides support for PCI com...
Question 120: Which settings are required when deploying Cisco IPS in high...
Question 121: With Cisco AMP for Endpoints on Windows, which three engines...
Question 122: Which option represents the cisco event aggregation product?...
Question 123: Which CLI command is used to generate firewall debug message...
Question 124: Which three zones are used for anomaly detection? (Choose th...
Question 125: Remote clients have reported application slowness. The remot...
Question 126: Which two conditions must you configure in an event action r...
Question 127: Which two options are features of the Cisco Email Security A...
Question 128: Which IPS signature regular expression CLI command matches a...
Question 129: A Cisco AnyConnect user profile can be pushed to the PC of a...
Question 130: Which Cisco ASA platform should be selected if the requireme...
Question 131: A network engineer may use which three types of certificates...
Question 132: Which three routing options are valid with Cisco FirePOWER v...
Question 133: Which Cisco Security IntelliShield Alert Manager Service com...
Question 134: A network engineer wants to deploy a virtual cisco ESA and w...
Question 135: If learning accept mode is set to "auto" and the knowledge b...
Question 136: (Exhibit) What is the status of OS Identification?...
Question 137: Which two benefits are provided by the dynamic dashboard in ...
Question 138: Which two tasks can the network discovery feature perform? (...
Question 139: A customer is concerned with their employee`s internet usage...
Question 140: What CLI command configures IP-based access to restrict GUI ...
Question 141: What is the function of the Web Proxy Auto-Discovery protoco...
Question 142: Which set of commands changes the FTP client timeout when th...
Question 143: (Exhibit) What action will the sensor take regarding IP addr...
Question 144: Which three access control actions permit traffic to pass th...
Question 145: Which two configuration steps are required for implementing ...
Question 146: Your corporate finance department purchased a new non-web-ba...
Question 147: Cisco's ASA CX includes which two URL categories? (Choose tw...
Question 148: Which information does whoami command display in a WSA?...
Question 149: During initial configuration, the Cisco ASA can be configure...
Question 150: Which policy must you edit to make changes to the Snort prep...
Question 151: (Exhibit) Which signature definition is virtual sensor 0 ass...
Question 152: In which way are packets handled when the IPS internal zone ...
Question 153: After adding a remote-access IPsec tunnel via the VPN wizard...
Question 154: Which command establishes a virtual console session to a CX ...
Question 155: Which option describes what occurs with asymmetric routing w...
Question 156: An engineer manages a Cisco Intrusion Prevention System via ...
Question 157: Which two commands are valid URL filtering commands? (Choose...
Question 158: Which three user roles are partially defined by default in P...
Question 159: An engineer is configuring AMP for the first time and can't ...
Question 160: (Exhibit) Between the Cisco ASA configuration and the Cisco ...
Question 161: Which three options are IPS signature classifications? (Choo...
Question 162: Which Cisco technology secures the network through malware f...
Question 163: Which two conditions must you configure in an event action o...
Question 164: Which information does the show scansafe statistics command ...
Question 165: Which four advanced endpoint assessment statements are corre...
Question 166: What is the correct deployment for an IPS appliance in a net...
Question 167: Which Cisco technology combats viruses and malware with viru...
Question 168: What is the default antispam policy for positively identifie...
Question 169: Which type of interface do you configure to receive traffic ...
Question 170: Which Cisco WSA is intended for deployment in organizations ...
Question 171: Refer to the exhibit. What are two facts about the interface...
Question 172: An engineer wants to cluster an existing ESA physical applia...
Question 173: What three alert notification options are available in Cisco...
Question 174: Which step is required when you configure URL filtering to C...
Question 175: (Exhibit) How many Cisco ASAs and how many Cisco WSAs are pa...
Question 176: Which piece of information is required to perform a policy t...
Question 177: Connections are being denied because of SenderBase Reputatio...
Question 178: Which statement about the default configuration of an IPS se...
Question 179: Which role does Passive Identity Management play in the Cisc...
Question 180: Which three functions can Cisco Application Visibility and C...
Question 181: An engineer is configuring cisco ESA with a multilayer appro...
Question 182: The Web Security Appliance has identities defined for facult...
Question 183: A user wants to configure high availability with their Cisco...
Question 184: What is the default CX Management 0/0 IP address on a Cisco ...
Question 185: Which four parameters must be defined in an ISAKMP policy wh...
Question 186: Which Cisco Cloud Web Security Connector feature allows acce...
Question 187: Which three pieces of information are required to implement ...
Question 188: In the cisco email security appliance, which tool be used to...
Question 189: How are HTTP requests handled by the Cisco WSA?...
Question 190: When a Cisco Email Security Appliance joins a cluster, which...
Question 191: Which Cisco Firepower rule action displays a HTTP warning pa...
Question 192: On which platforms can you run CWS connector? (choose two)...
Question 193: Which command is used on the cisco firepower threat defense ...
Question 194: An engineer must deploy email security to a large enterprise...
Question 195: What are two benefits of using SPAN with promiscuous mode de...
Question 196: Which two statements about Cisco ESA clusters are true? (Cho...
Question 197: A network administrator noticed all traffic that is redirect...
Question 198: What are the initial actions that can be performed on an inc...
Question 199: Which two GUI options display users' activity in Cisco Web S...
Question 200: Your organization has subscribed to the Cisco Cloud Web Secu...
Question 201: When does the Cisco ASA send traffic to the Cisco ASA IPS mo...
Question 202: Upon receiving a digital certificate, what are three steps t...
Question 203: What is the authentication method for an encryption envelope...
Question 204: What is the function of the Cisco Context Adaptive Scanning ...
Question 205: Which Cisco technology secures the network through malware f...
Question 206: Which devices support cluster?
Question 207: Which is the default IP address and admin port setting for h...
Question 208: How does a user access a Cisco Web Security Appliance for in...
Question 209: Which feature of the Cisco Hybrid Email Security services en...
Question 210: Which Option of SNMPv3 ensure authentication but no encrypti...
Question 211: Which three statements about Cisco ASA CX are true? (Choose ...
Question 212: When creating an SSL policy on Cisco FirePOWER, which three ...
Question 213: A security engineer is configuring user identity for the Cis...
Question 214: Which option describes the role of the Learning Accept Mode ...
Question 215: An engineer wants to improve web traffic performance by prox...
Question 216: A network security design engineer is considering using a Ci...
Question 217: Which five system management protocols are supported by the ...