<< Prev Question Next Question >>

Question 45/147

What is the RTC workflow when the infected endpoint is identified?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (147q)
Question 1: What is the role of the casebook feature in Cisco Threat Res...
Question 2: Which Cisco Firepower feature is used to reduce the number o...
Question 3: An engineer is setting up a remote access VPN on a Cisco FTD...
Question 4: Which Cisco Advanced Malware Protection for Endpoints policy...
Question 5: An engineer attempts to pull the configuration for a Cisco F...
Question 6: Cisco Security Analytics and Logging SaaS licenses come with...
Question 7: Which feature is supported by IRB on Cisco FTD devices?...
Question 8: An administrator is configuring their transparent Cisco FTD ...
Question 9: A cisco Secure firewall Threat Defence device is configured ...
Question 10: A security engineer must create a malware and file policy on...
Question 11: A network administrator wants to block traffic to a known ma...
Question 12: An engineer must investigate a connectivity issue from an en...
Question 13: An engineer defines a new rule while configuring an Access C...
Question 14: An administrator Is setting up a Cisco PMC and must provide ...
Question 15: An engineer must investigate a connectivity issue and decide...
Question 16: When a Cisco FTD device is configured in transparent firewal...
Question 17: An engineer is configuring two new Cisco FTD devices to repl...
Question 18: administrator is configuring SNORT inspection policies and i...
Question 19: An engineer is troubleshooting connectivity to the DNS serve...
Question 20: Network users experience issues when accessing a server on a...
Question 21: IT management is asking the network engineer to provide high...
Question 22: An engineer is configuring a custom application detector for...
Question 23: A network engineer must provide redundancy between two Cisco...
Question 24: A network administrator registered a new FTD to an existing ...
Question 25: A network engineer detects a connectivity issue between Cisc...
Question 26: An administrator is attempting to add a Cisco Secure Firewal...
Question 27: What is a valid Cisco AMP file disposition?...
Question 28: Which two routing options are valid with Cisco Firepower Thr...
Question 29: An organization is configuring a new Cisco Firepower High Av...
Question 30: An engineer must configure a Cisco FMC dashboard in a child ...
Question 31: Due to an Increase in malicious events, a security engineer ...
Question 32: An engineer is configuring URL filtering for a Cisco FTD dev...
Question 33: An engineer is investigating connectivity problems on Cisco ...
Question 34: Within an organization's high availability environment where...
Question 35: Which Cisco Firepower Threat Defense, which two interface se...
Question 36: An engineer configures an access control rule that deploys f...
Question 37: What is the advantage of having Cisco Firepower devices send...
Question 38: A network engineer must configure an existing firewall to ha...
Question 39: An administrator is attempting to remotely log into a switch...
Question 40: An engineer is attempting to create a new dashboard within t...
Question 41: An engineer must integrate a thud-party security Intelligenc...
Question 42: An organization created a custom application that is being f...
Question 43: Which two dynamic routing protocols are supported in Firepow...
Question 44: Which policy rule is included in the deployment of a local D...
Question 45: What is the RTC workflow when the infected endpoint is ident...
Question 46: An engineer integrates Cisco FMC and Cisco ISE using pxGrid....
Question 47: After deploying a network-monitoring tool to manage and moni...
Question 48: While configuring FTD, a network engineer wants to ensure th...
Question 49: An engineer is configuring a Cisco Secure Firewall Threat De...
Question 50: Which firewall design allows a firewall to forward traffic a...
Question 51: When deploying a Cisco ASA Firepower module, an organization...
Question 52: Which connector is used to integrate Cisco ISE with Cisco FM...
Question 53: (Exhibit) Refer to the exhibit. An engineer is analyzing a N...
Question 54: When packet capture is used on a Cisco Secure Firewall Threa...
Question 55: A Cisco FMC administrator wants to configure fastpathing of ...
Question 56: A network engineer is planning on replacing an Active/Standb...
Question 57: What is the advantage of having Cisco Firepower devices send...
Question 58: An organization has a Cisco FTD that uses bridge groups to p...
Question 59: In which two ways do access control policies operate on a Ci...
Question 60: An engineer must export a packet capture from Cisco Secure F...
Question 61: An engineer is attempting to add a new FTD device to their F...
Question 62: An engineer wants to connect a single IP subnet through a Ci...
Question 63: An administrator must fix a network problem whereby traffic ...
Question 64: Which action should you take when Cisco Threat Response noti...
Question 65: What is a feature of Cisco AMP private cloud?...
Question 66: An engineer must configure high availability for the Cisco F...
Question 67: In a Cisco AMP for Networks deployment, which disposition is...
Question 68: What is a characteristic of bridge groups on a Cisco FTD?...
Question 69: A network administrator notices that SI events are not being...
Question 70: An engineer has been tasked with using Cisco FMC to determin...
Question 71: Which command is typed at the CLI on the primary Cisco FTD u...
Question 72: An engineer is troubleshooting a device that cannot connect ...
Question 73: A hospital network needs to upgrade their Cisco FMC managed ...
Question 74: Which license type is required on Cisco ISE to integrate wit...
Question 75: An organization recently implemented a transparent Cisco FTD...
Question 76: Which Firepower feature allows users to configure bridges in...
Question 77: A user within an organization opened a malicious file on a w...
Question 78: An administrator must use Cisco FMC to install a backup rout...
Question 79: An administrator receives reports that users cannot access a...
Question 80: Which CLI command is used to control special handling of cli...
Question 81: An engineer must configure a Cisco FMC dashboard in a multid...
Question 82: A security engineer found a suspicious file from an employee...
Question 83: An engineer currently has a Cisco FTD device registered to t...
Question 84: An engineer plans to reconfigure an existing Cisco FTD from ...
Question 85: (Exhibit) A security engineer must improve security in an or...
Question 86: A network engineer wants to add a third-party threat feed in...
Question 87: What is the role of realms in the Cisco ISE and Cisco FMC in...
Question 88: Refer to the exhibit. (Exhibit) An administrator is looking ...
Question 89: Which command must be run to generate troubleshooting files ...
Question 90: Which action should be taken after editing an object that is...
Question 91: A network administrator wants to configure a Cisco Secure Fi...
Question 92: An organization does not want to use the default Cisco Firep...
Question 93: A network administrator is configuring an FTD in transparent...
Question 94: A network engineer sets up a secondary Cisco FMC that is int...
Question 95: Within Cisco Firepower Management Center, where does a user ...
Question 96: A network administrator is trying to configure an access rul...
Question 97: An engineer is configuring a Cisco IPS to protect the networ...
Question 98: An analyst using the security analyst account permissions is...
Question 99: An engineer must define a URL object on Cisco FMC. What is t...
Question 100: Which component is needed to perform rapid threat containmen...
Question 101: With Cisco Firepower Threat Defense software, which interfac...
Question 102: While integrating Cisco Umbrella with Cisco Threat Response,...
Question 103: An engineer is tasked with deploying an internal perimeter f...
Question 104: Refer to the exhibit. (Exhibit) And engineer is analyzing th...
Question 105: A network administrator notices that remote access VPN users...
Question 106: Which two remediation options are available when Cisco FMC i...
Question 107: A security engineer manages a firewall console and an endpoi...
Question 108: An engineer is configuring a custom intrusion rule on Cisco ...
Question 109: An engineer is configuring URL filtering tor a Cisco Secure ...
Question 110: A security engineer is configuring an Access Control Policy ...
Question 111: A consultant Is working on a project where the customer is u...
Question 112: A network administrator needs to create a policy on Cisco Fi...
Question 113: A company has many Cisco FTD devices managed by a Cisco FMC....
Question 114: Which two considerations must be made when deleting and re-a...
Question 115: A network administrator is reviewing a weekly scheduled atta...
Question 116: An engineer wants to add an additional Cisco FTD Version 6.2...
Question 117: A network administrator reviews me attack risk report and no...
Question 118: A network engineer is deploying a pair of Cisco Secure Firew...
Question 119: A network administrator must create an EtherChannel Interfac...
Question 120: A network administrator notices that inspection has been int...
Question 121: What is a limitation to consider when running a dynamic rout...
Question 122: Refer to the exhibit. What must be done to fix access to thi...
Question 123: A network security engineer must replace a faulty Cisco FTD ...
Question 124: An administrator is configuring the interface of a Cisco Sec...
Question 125: With a recent summer time change, system logs are showing ac...
Question 126: Drag and drop the steps to restore an automatic device regis...
Question 127: Which file format can standard reports from Cisco Secure Fir...
Question 128: A network administrator is configuring a site-to-site IPsec ...
Question 129: An engineer must deploy a Cisco FTD appliance via Cisco FMC ...
Question 130: Which protocol establishes network redundancy in a switched ...
Question 131: An engineer wants to perform a packet capture on the Cisco F...
Question 132: Which firewall design will allow It to forward traffic at la...
Question 133: An engineer configures a network discovery policy on Cisco F...
Question 134: A network administrator is configuring Snort inspection poli...
Question 135: An organization has noticed that malware was downloaded from...
Question 136: Which two statements about bridge-group interfaces in Cisco ...
Question 137: Which two routing options are valid with Cisco FTD? (Choose ...
Question 138: Which report template field format is available in Cisco FMC...
Question 139: Which two deployment types support high availability? (Choos...
Question 140: A security engineer must configure policies tor a recently d...
Question 141: A network administrator cannot select the link to be used fo...
Question 142: A company is deploying Cisco Secure Endpoint private cloud. ...
Question 143: A security engineer must configure a Cisco FTD appliance to ...
Question 144: Refer to the exhibit. (Exhibit) An organization has an acces...
Question 145: What is the result when two users modify a VPN policy at the...
Question 146: An analyst is investigating a potentially compromised endpoi...
Question 147: A company is deploying intrusion protection on multiple Cisc...