<< Prev Question Next Question >>

Question 86/229

With Cisco IDM, which rate limit option specifies the maximum bandwidth for rate-limited traffic?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (229q)
Question 1: Which interface on the Cisco Email Security Appliance has HT...
Question 2: Which three user roles are partially defined by default in P...
Question 3: With Cisco ASA active/standby failover, what is needed to en...
Question 4: Which configuration option causes an ASA with IPS module to ...
Question 5: When deploying Cisco FirePOWER appliances, which option must...
Question 6: What can you use to access the Cisco IPS secure command and ...
Question 7: An engineer wants to improve web traffic performance by prox...
Question 8: Refer to the exhibit. What CLI command generated the output?...
Question 9: An engineer is configuring a cisco ESA and wants to control ...
Question 10: After configuring an ISR with the Cisco Cloud Web Security c...
Question 11: Which platform has message tracking enabled by default?...
Question 12: (Exhibit) Refer to the exhibit. Which configuration below wo...
Question 13: Which two options are the basic parts of a Snort rule? (Choo...
Question 14: Which Cisco Security IntelliShield Alert Manager Service com...
Question 15: Which three statements about Cisco ASA CX are true? (Choose ...
Question 16: Elliptic curve cryptography is a stronger more efficient cry...
Question 17: Which three features does Cisco CX provide? (Choose three.)...
Question 18: Which two tasks can the network discovery feature perform? (...
Question 19: Which IPS signature engine inspects the IP protocol packets ...
Question 20: Which two options are characteristics of router-based IPS? (...
Question 21: Which two software can be installed on a Cisco ASA-5545-X ap...
Question 22: Which Cisco technology prevents targeted malware attacks, pr...
Question 23: Which Cisco WSA is intended for deployment in organizations ...
Question 24: Refer to the exhibit. The security engineer has configured c...
Question 25: (Exhibit) Which three statements about the Cisco IPS applian...
Question 26: What is the default antispam policy for positively identifie...
Question 27: Which four methods are used to deploy transparent mode traff...
Question 28: What are three best practices for a Cisco Intrusion Preventi...
Question 29: Which Cisco ESA command is used to edit the ciphers that are...
Question 30: Which is the default IP address and admin port setting for h...
Question 31: Which Cisco IOS command uses the default class map to limit ...
Question 32: A Cisco ASA requires an additional feature license to enable...
Question 33: An engineer is using the policy trace tool to troubleshoot a...
Question 34: Which version of AsyncOS for web is required to deploy the W...
Question 35: Which Cisco Firepower rule action displays a HTTP warning pa...
Question 36: A user wants to deploy your managed device in Layer 3 routed...
Question 37: Which IPS engine detects ARP spoofing?...
Question 38: Which two statements regarding the basic setup of the Cisco ...
Question 39: Which four statements are correct regarding management acces...
Question 40: Which option lists the minimum requirements to deploy a mana...
Question 41: Which Option of SNMPv3 ensure authentication but no encrypti...
Question 42: Which two dynamic routing protocols are supported in Firepow...
Question 43: Which two services must remain as on-premises equipment when...
Question 44: Connections are being denied because of SenderBase Reputatio...
Question 45: Which three functions can Cisco Application Visibility and C...
Question 46: How many interfaces can a Cisco ASA bridge group support and...
Question 47: Which command applies WCCP redirection on the inside interfa...
Question 48: Which statement about the default configuration of an IPS se...
Question 49: In order to set up HTTPS decryption on the Cisco Web Securit...
Question 50: Using the default modular policy framework global configurat...
Question 51: Your corporate finance department purchased a new non-web-ba...
Question 52: Which Cisco Web Security Appliance design requires minimal c...
Question 53: In a Cisco AMP for Networks deployment, which disposition is...
Question 54: On which platforms can you run CWS connector? (choose two)...
Question 55: Which Cisco Web Security Appliance deployment mode requires ...
Question 56: Which option lists the minimum requirements to deploy a mana...
Question 57: Which Cisco technology provides spam filtering and email pro...
Question 58: A security engineer is configuring user identity for the Cis...
Question 59: Which two methods are used to deploy transparent mode traffi...
Question 60: Which IPS signature regular expression CLI command matches a...
Question 61: Which antispam technology assumes that email from server A, ...
Question 62: How does a user access a Cisco Web Security Appliance for in...
Question 63: Where in the Cisco ASA appliance CLI are Active/Active Failo...
Question 64: When a Cisco Email Security Appliance joins a cluster, which...
Question 65: What three alert notification options are available in Cisco...
Question 66: Upon receiving a digital certificate, what are three steps t...
Question 67: Which action cloud reduce the security of the management int...
Question 68: Cisco's ASA CX includes which two URL categories? (Choose tw...
Question 69: Refer to the exhibit. Which four rows exhibit the correct WC...
Question 70: Which settings are required when deploying Cisco IPS in high...
Question 71: An ASA with an IPS module must be configured to drop traffic...
Question 72: Who or what calculates the signature fidelity rating in a Ci...
Question 73: Which command sets the number of packets to log on a Cisco I...
Question 74: An engineer wants to cluster an existing ESA physical applia...
Question 75: What are three benefits of the Cisco AnyConnect Secure Mobil...
Question 76: What CLI command configures IP-based access to restrict GUI ...
Question 77: Which Cisco technology secures the network through malware f...
Question 78: Which CLI command is used to generate firewall debug message...
Question 79: A Cisco Web Security Appliance's policy can provide visibili...
Question 80: Which set of commands changes the FTP client timeout when th...
Question 81: Which Cisco technology is a customizable web-based alerting ...
Question 82: A network engineer can assign IPS event action overrides to ...
Question 83: What can Cisco Prime Security Manager (PRSM) be used to achi...
Question 84: What is the authentication method for an encryption envelope...
Question 85: Joe was asked to secure access to the Cisco Web Security App...
Question 86: With Cisco IDM, which rate limit option specifies the maximu...
Question 87: What is the CLI command to create a new Message Filter in a ...
Question 88: Which option represents the cisco event aggregation product?...
Question 89: Which two commands are used to verify that CWS redirection i...
Question 90: Which Cisco technology combats viruses and malware with viru...
Question 91: When learning accept mode is set to auto, and the action is ...
Question 92: With Cisco AMP for Endpoints on Windows, which three engines...
Question 93: Which five system management protocols are supported by the ...
Question 94: Which statement about the Cisco CWS web filtering policy beh...
Question 95: Which feature of the Cisco Hybrid Email Security services en...
Question 96: What are the initial actions that can be performed on an inc...
Question 97: Which SSL traffic decryption feature is used when decrypting...
Question 98: Which five system management and reporting protocols are sup...
Question 99: Which two GUI options display users' activity in Cisco Web S...
Question 100: Which Cisco ASA platform should be selected if the requireme...
Question 101: Which two authentication options can be leveraged for direct...
Question 102: An engineer is configuring cisco ESA with a multilayer appro...
Question 103: Which two practices are recommended for implementing NIPS at...
Question 104: Which devices support cluster?
Question 105: An engineer must architect an AMP private cloud deployment. ...
Question 106: Which three zones are used for anomaly detection? (Choose th...
Question 107: What command alters the SSL ciphers used by the Cisco Email ...
Question 108: Which two options are features of the Cisco Email Security A...
Question 109: Which Cisco monitoring solution displays information and imp...
Question 110: Which two options are the correct URL and credentials used t...
Question 111: An engineer is configuring AMP for the first time and can't ...
Question 112: Which five system management protocols are supported by the ...
Question 113: Which information does the show scansafe statistics command ...
Question 114: In the Predefined URL Category Filtering configuration page ...
Question 115: To enable the Cisco ASA Host Scan with remediation capabilit...
Question 116: Which type of interface do you configure to receive traffic ...
Question 117: Which two design considerations are required to add the Cisc...
Question 118: Which Cisco AMP file disposition valid?...
Question 119: Which Cisco technology secures the network through malware f...
Question 120: What Event Action in an IPS signature is used to stop an att...
Question 121: Which option describes what occurs with asymmetric routing w...
Question 122: An IPS is configured to fail-closed and you observe that all...
Question 123: Which option describes the role of the Learning Accept Mode ...
Question 124: Which command verifies that CWS redirection is working on a ...
Question 125: Which command is used on the cisco firepower threat defense ...
Question 126: A network security design engineer is considering using a Ci...
Question 127: Which three options are IPS signature classifications? (Choo...
Question 128: How are HTTP requests handled by the Cisco WSA?...
Question 129: Which statement about the Cisco ASA botnet traffic filter is...
Question 130: Which command establishes a virtual console session to a CX ...
Question 131: What is the default CX Management 0/0 IP address on a Cisco ...
Question 132: What is the default IP range of the external zone?...
Question 133: The security team needs to limit the number of e-mails they ...
Question 134: A Cisco AnyConnect user profile can be pushed to the PC of a...
Question 135: By default, which access rule is applied inbound to the insi...
Question 136: Which command is used to enable strong ciphers on the Cisco ...
Question 137: An engineer wants to configure a method to verify the authen...
Question 138: Which Cisco AMP for Endpoints, what is meant by simple custo...
Question 139: Which two benefits are provided by the dynamic dashboard in ...
Question 140: With Cisco FirePOWER Threat Defense software, which interfac...
Question 141: What is the access-list command on a Cisco IPS appliance use...
Question 142: Which Cisco ASA SSL VPN feature provides support for PCI com...
Question 143: Refer to the exhibit. The system administrator of mydomain.c...
Question 144: Which three search parameters are supported by the Email Sec...
Question 145: (Exhibit) What is the status of OS Identification?...
Question 146: In cisco firePOWER 5.x and 6.0, which type of traffic causes...
Question 147: Which statement about the Cisco ASA CX role in inspecting SS...
Question 148: A Cisco Email Security Appliance uses which message filter t...
Question 149: (Exhibit) To what extent will the Cisco IPS sensor contribut...
Question 150: Which four parameters must be defined in an ISAKMP policy wh...
Question 151: A new Cisco IPS device has been placed on the network withou...
Question 152: The Web Security Appliance has identities defined for facult...
Question 153: Which three statements concerning keystroke logger detection...
Question 154: Which two statements about Cisco Cloud Web Security function...
Question 155: Which Cisco WSA is intended for deployment in organizations ...
Question 156: In the cisco email security appliance, which tool be used to...
Question 157: For which task can PRSM be used?...
Question 158: Which four advanced endpoint assessment statements are corre...
Question 159: During initial configuration, the Cisco ASA can be configure...
Question 160: Which three options are characteristics of router-based IPS?...
Question 161: Which three webtype ACL statements are correct? (Choose thre...
Question 162: A network engineer may use which three types of certificates...
Question 163: Refer to the exhibit. When designing the network to redirect...
Question 164: What is the default antispam policy for positively identifie...
Question 165: Which three zones are used for anomaly detection in a Cisco ...
Question 166: Who or what calculates the signature fidelity rating?...
Question 167: Which command verifies that the correct CWS license key info...
Question 168: Which two configuration steps are required for implementing ...
Question 169: Which description of an advantage of utilizing IPS virtual s...
Question 170: Which two routing options are valid with cisco firePOWER thr...
Question 171: Which Cisco technology is a modular security service that co...
Question 172: Which two commands are valid URL filtering commands? (Choose...
Question 173: Which Cisco ASA object group type offers the most flexibilit...
Question 174: Access the configuration of the Cisco Email Security Applian...
Question 175: You ran the ssh generate-key command on the Cisco IPS and no...
Question 176: (Exhibit) Which signature definition is virtual sensor 0 ass...
Question 177: Which two statement about Cisco Firepower file and intrusion...
Question 178: Cisco AVC allows control of which three of the following? (C...
Question 179: Which policy must you edit to make changes to the Snort prep...
Question 180: Which two types of digital certificate enrollment processes ...
Question 181: Which step is required when you configure URL filtering to C...
Question 182: An engineer is configuring a Cisco Email Security Appliance ...
Question 183: Which two ports does the ISR G2 connector for CWS support re...
Question 184: When attempting to tunnel FTP traffic through a stateful fir...
Question 185: What are two benefits of using SPAN with promiscuous mode de...
Question 186: What step is required to enable HTTPS Proxy on the Cisco Web...
Question 187: Which three statements about threat ratings are true? (Choos...
Question 188: Which statement about Cisco IPS Manager Express is true?...
Question 189: Which two TCP ports can allow the Cisco Firepower Management...
Question 190: A network engineer wants to deploy a virtual cisco ESA and w...
Question 191: A user is deploying a Cisco IPS appliance in a data center t...
Question 192: Which port is used for CLI Secure shell access?...
Question 193: A network administrator noticed all traffic that is redirect...
Question 194: A customer is concerned with their employee`s internet usage...
Question 195: What is the function of the Web Proxy Auto Discovery protoco...
Question 196: The helpdesk was asked to provide a record of delivery for a...
Question 197: When centralized message tracking is enabled on the Cisco ES...
Question 198: (Exhibit) What action will the sensor take regarding IP addr...
Question 199: (Exhibit) Which two statements about Signature 1104 are true...
Question 200: When https traffic is scanned, which component of the full U...
Question 201: Which signature engine is responsible for ICMP inspection on...
Question 202: Which two Cisco IPS events will generate an IP log? (Choose ...
Question 203: After adding a remote-access IPsec tunnel via the VPN wizard...
Question 204: Which command allows the administrator to access the Cisco W...
Question 205: When using Cisco AMP for Networks, which feature copies a fi...
Question 206: When does the Cisco ASA send traffic to the Cisco ASA IPS mo...
Question 207: Using the Cisco WSA GUI, where should an operator navigate t...
Question 208: At which value do custom signatures begin?...
Question 209: Which three functions can Cisco Application Visibility and C...
Question 210: In cisco Firepower 6.0, which policy contains the button tha...
Question 211: Which information does whoami command display in a WSA?...
Question 212: An engineering team has implemented Transparent User Identif...
Question 213: Which statement about Cisco ASA multicast routing support is...
Question 214: Within Cisco IPS anomaly detection, what is the default IP r...
Question 215: Which three access control actions permit traffic to pass th...
Question 216: Which three options are valid event actions for a Cisco IPS?...
Question 217: Which action is possible when a signature is triggered on th...
Question 218: What is the correct deployment for an IPS appliance in a net...
Question 219: An engineer manages a Cisco Intrusion Prevention System via ...
Question 220: Which technique is deployed to harden network devices?...
Question 221: Which commands are required to configure SSH on router? (Cho...
Question 222: An engineer must deploy AMP with cloud protection. Which mac...
Question 223: Remote clients have reported application slowness. The remot...
Question 224: Refer to the exhibit. The system administrator of mydomain.c...
Question 225: Which Cisco IPS CLI command shows the most fired signature?...
Question 226: When creating an SSL policy on Cisco FirePOWER, which three ...
Question 227: Refer to the exhibit. What Cisco ESA CLI command generated t...
Question 228: Which statement regarding hashing is correct?...
Question 229: What does the anomaly detection Cisco IOS IPS component dete...