<< Prev Question Next Question >>

Question 55/292

An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (292q)
Question 1: Drag and drop the NetFlow export formats from the left onto ...
Question 2: Which DevSecOps implementation process gives a weekly or dai...
Question 3: Which factor must be considered when choosing the on-premise...
Question 4: (Exhibit) Refer to the exhibit. All servers are in the same ...
Question 5: Which attribute has the ability to change during the RADIUS ...
Question 6: What provides the ability to program and monitor networks fr...
Question 7: What is a function of the Layer 4 Traffic Monitor on a Cisco...
Question 8: Drag and drop the concepts from the left onto the correct de...
Question 9: How does Cisco Stealthwatch Cloud provide security for cloud...
Question 10: What is a characteristic of an EDR solution and not of an EP...
Question 11: Which two services must remain as on-premises equipment when...
Question 12: What is the benefit of installing Cisco AMP for Endpoints on...
Question 13: What is a description of microsegmentation?...
Question 14: Which two capabilities of Integration APIs are utilized with...
Question 15: Which two risks is a company vulnerable to if it does not ha...
Question 16: When a next-generation endpoint security solution is selecte...
Question 17: Why is it important to have a patching strategy for endpoint...
Question 18: Elliptic curve cryptography is a stronger more efficient cry...
Question 19: II An engineer musi set up 200 new laptops on a network and ...
Question 20: What are two characteristics of Cisco DNA Center APIs? (Choo...
Question 21: Which system facilitates deploying microsegmentation and mul...
Question 22: Which threat intelligence standard contains malware hashes?...
Question 23: What is an attribute of Cisco Talos?...
Question 24: For Cisco IOS PKI, which two types of Servers are used as a ...
Question 25: What are two benefits of using Cisco Duo as an MFA solution?...
Question 26: In which two customer environments is the Cisco Secure Web A...
Question 27: What is an advantage of using a next-generation firewall com...
Question 28: Refer to the exhibit, (Exhibit) which command results in the...
Question 29: Which network monitoring solution uses streams and pushes op...
Question 30: What is the purpose of the Decrypt for Application Detection...
Question 31: Drag and drop the Firepower Next Generation Intrusion Preven...
Question 32: Refer to the exhibit. (Exhibit) Traffic is not passing throu...
Question 33: How does a cloud access security broker function?...
Question 34: What are two workloaded security models? (Choose two)...
Question 35: (Exhibit) Refer to the exhibit. An engineer is implementing ...
Question 36: What are two advantages of using Cisco Any connect over DMVP...
Question 37: An engineer is configuring 802.1X authentication on Cisco sw...
Question 38: An organization wants to secure users, data, and application...
Question 39: Refer to the exhibit. (Exhibit) Which configuration item mak...
Question 40: Which two characteristics of messenger protocols make data e...
Question 41: Refer to the exhibit. (Exhibit) What does the API do when co...
Question 42: An engineer is configuring AMP for endpoints and wants to bl...
Question 43: Refer to the exhibit. (Exhibit) An administrator is adding a...
Question 44: Which two protocols must be configured to authenticate end u...
Question 45: Which VMware platform does Cisco ACI integrate with to provi...
Question 46: Which feature is configured for managed devices in the devic...
Question 47: What is a capability of Cisco ASA Netflow?...
Question 48: Which API technology with SDN architecture is used to commun...
Question 49: Which threat involves software being used to gain unauthoriz...
Question 50: Which solution for remote workers enables protection, detect...
Question 51: Which action configures the IEEE 802.1X Flexible Authenticat...
Question 52: What is a benefit of using a multifactor authentication stra...
Question 53: Which two criteria must a certificate meet before the WSA us...
Question 54: Which security product enables administrators to deploy Kube...
Question 55: An engineer is configuring Cisco Secure Endpoint to enhance ...
Question 56: Refer to the exhibit. (Exhibit) What are two indications of ...
Question 57: What is the difference between deceptive phishing and spear ...
Question 58: Cisco SensorBase gaihers threat information from a variety o...
Question 59: Which two preventive measures are used to control cross-site...
Question 60: Why is it important to implement MFA inside of an organizati...
Question 61: Which Cisco platform onboards the endpoint and can issue a C...
Question 62: How does Cisco Advanced Phishing Protection protect users?...
Question 63: Which two request of REST API are valid on the Cisco ASA Pla...
Question 64: Refer to the exhibit. (Exhibit) What will happen when this P...
Question 65: What is the function of Cisco Cloudlock for data security?...
Question 66: Which DoS attack uses fragmented packets in an attempt to cr...
Question 67: An engineer is configuring cloud logging on Cisco ASA and ne...
Question 68: Drag and drop the security solutions from the left onto the ...
Question 69: What is the role of an endpoint in protecting a user from a ...
Question 70: Which standard is used to automate exchanging cyber threat i...
Question 71: What is a difference between a zone-based firewall and a Cis...
Question 72: A company recently discovered an attack propagating througho...
Question 73: (Exhibit) Refer to the exhibit. An engineer must enable secu...
Question 74: An organization is trying to implement micro-segmentation on...
Question 75: Under which two circumstances is a CoA issued? (Choose two)...
Question 76: What is a language format designed to exchange threat intell...
Question 77: What are two Detection and Analytics Engines of Cognitive Th...
Question 78: Which algorithm provides encryption and authentication for d...
Question 79: Which two are valid suppression types on a Cisco Next Genera...
Question 80: Which Cisco WSA feature supports access control using URL ca...
Question 81: Which Cisco Firewall solution requires zone definition?...
Question 82: In which cloud services model is the tenant responsible for ...
Question 83: Which two actions does the Cisco identity Services Engine po...
Question 84: In which type of attack does the attacker insert their machi...
Question 85: An engineer needs a solution for TACACS+ authentication and ...
Question 86: An engineer configured a new network identity in Cisco Umbre...
Question 87: An engineer must modify a policy to block specific addresses...
Question 88: What is the purpose of the My Devices Portal in a Cisco ISE ...
Question 89: An engineer is deploying a Cisco Secure Email Gateway and mu...
Question 90: When a Cisco Secure Web Appliance checks a web request, what...
Question 91: In which scenario is endpoint-based security the solution?...
Question 92: A network administrator has configured TACACS on a network d...
Question 93: Which category includes DoS Attacks?...
Question 94: Which two activities can be done using Cisco DNA Center? (Ch...
Question 95: Based on the NIST 800-145 guide, which cloud architecture ma...
Question 96: Email security has become a high-priority task for a securit...
Question 97: Why would a user choose an on-premises ESA versus the CES so...
Question 98: In which two ways does a system administrator send web traff...
Question 99: An engineer is configuring cloud logging using a company-man...
Question 100: What are two security benefits of an MDM deployment? (Choose...
Question 101: Which functions of an SDN architecture require southbound AP...
Question 102: What is the purpose of a denial-of-service attack?...
Question 103: When planning a VPN deployment, for which reason does an eng...
Question 104: Drag and drop the Cisco CWS redirection options from the lef...
Question 105: Which Cisco cloud security software centrally manages polici...
Question 106: Which characteristic is unique to a Cisco WSAv as compared t...
Question 107: A Cisco Secure Cloud Analytics administrator is setting up a...
Question 108: What is a functional difference between Cisco Secure Endpoin...
Question 109: Which method is used to deploy certificates and configure th...
Question 110: An engineer is trying to securely connect to a router and wa...
Question 111: Which Cisco security solution gives the most complete view o...
Question 112: What must be configured on Cisco Secure Endpoint to create a...
Question 113: Which solution should be leveraged for secure access of a CI...
Question 114: Which feature requires that network telemetry be enabled?...
Question 115: Which two aspects of the cloud PaaS model are managed by the...
Question 116: Which two devices support WCCP for traffic redirection? (Cho...
Question 117: An organization has DHCP servers set up to allocate IP addre...
Question 118: Which compliance status is shown when a configured posture p...
Question 119: A company is experiencing exfiltration of credit card number...
Question 120: Which two components do southbound APIs use to communicate w...
Question 121: An engineer must modify a policy to block specific addresses...
Question 122: Which two mechanisms are used to control phishing attacks? (...
Question 123: When MAB is configured for use within the 802.1X environment...
Question 124: A user has a device in the network that is receiving too man...
Question 125: Due to a traffic storm on the network, two interfaces were e...
Question 126: When a Cisco WSA checks a web request, what occurs if it is ...
Question 127: Which two statements about a Cisco WSA configured in Transpa...
Question 128: A small organization needs to reduce the VPN bandwidth load ...
Question 129: (Exhibit) Refer to the exhibit. Traffic is not passing throu...
Question 130: An engineer is configuring their router to send NetfFow data...
Question 131: Which type of dashboard does Cisco DNA Center provide for co...
Question 132: Which two capabilities of Integration APIs are utilized with...
Question 133: Refer to the exhibit. (Exhibit) What is a result of the conf...
Question 134: A network security engineer must export packet captures from...
Question 135: An engineer is configuring Cisco Umbrella and has an identit...
Question 136: Which technology should be used to help prevent an attacker ...
Question 137: An organization wants to use Cisco FTD or Cisco ASA devices....
Question 138: Which threat intelligence standard contains malware hashes?...
Question 139: An engineer must enable Outbreak Filters globally on an Asyn...
Question 140: Which two application layer preprocessors are used by Firepo...
Question 141: (Choose two)
Question 142: In an IaaS cloud services model, which security function is ...
Question 143: Which Cisco Umbrella package supports selective proxy for In...
Question 144: What are two functions of IKEv1 but not IKEv2? (Choose two)...
Question 145: An organization has a requirement to collect full metadata i...
Question 146: What is a benefit of using telemetry over SNMP to configure ...
Question 147: What is the benefit of integrating Cisco ISE with a MDM solu...
Question 148: An organization has two systems in their DMZ that have an un...
Question 149: Drag and drop the suspicious patterns for the Cisco Tetratio...
Question 150: When wired 802.1X authentication is implemented, which two c...
Question 151: What is the function of the crypto is a kmp key cisc40639795...
Question 152: What must be enabled to secure SaaS-based applications?...
Question 153: An engineer is configuring Cisco WSA and needs to deploy it ...
Question 154: Which feature is used to restrict communication between inte...
Question 155: What is the purpose of the certificate signing request when ...
Question 156: Which two methods must be used to add switches into the fabr...
Question 157: Email security has become a high priority task for a securit...
Question 158: Which MDM configuration provides scalability?...
Question 159: Which RADIUS feature provides a mechanism to change the AAA ...
Question 160: Which ID store requires that a shadow user be created on Cis...
Question 161: Which form of attack is launched using botnets?...
Question 162: Which Cisco network security device supports contextual awar...
Question 163: In a PaaS model, which layer is the tenant responsible for m...
Question 164: Which kind of API that is used with Cisco DNA Center provisi...
Question 165: What are two facts about WSA HTTP proxy configuration with a...
Question 166: An email administrator is setting up a new Cisco ESA. The ad...
Question 167: Which two Cisco Umbrella security categories are used to pre...
Question 168: Refer to the exhibit. (Exhibit) Which command was used to ge...
Question 169: Why should organizations migrate to an MFA strategy for auth...
Question 170: An organization must add new firewalls to its infrastructure...
Question 171: What is the purpose of CA in a PKI?...
Question 172: An engineer has been tasked with configuring a Cisco FTD to ...
Question 173: Which type of algorithm provides the highest level of protec...
Question 174: An engineer wants to automatically assign endpoints that hav...
Question 175: A network administrator is configuring a role in an access c...
Question 176: Drag and drop the posture assessment flow actions from the l...
Question 177: Which two prevention techniques are used to mitigate SQL inj...
Question 178: Why is it important to patch endpoints consistently?...
Question 179: A network engineer is configuring NetFlow top talkers on a C...
Question 180: A switch with Dynamic ARP Inspection enabled has received a ...
Question 181: An engineer is deploying Cisco Advanced Malware Protection (...
Question 182: A security engineer is tasked with configuring TACACS on a C...
Question 183: In which two ways does Easy Connect help control network acc...
Question 184: Which posture assessment requirement provides options to the...
Question 185: What does Cisco ISE use to collect endpoint attributes that ...
Question 186: A network engineer must configure a Cisco ESA to prompt user...
Question 187: When using Cisco AMP for Networks which feature copies a fil...
Question 188: An engineer used a posture check on a Microsoft Windows endp...
Question 189: Which IETF attribute is supported for the RADIUS CoA feature...
Question 190: An engineer must implement a file transfer solution between ...
Question 191: What is a characteristic of Cisco ASA Netflow v9 Secure Even...
Question 192: Refer to the exhibit. (Exhibit) Consider that any feature of...
Question 193: What is an advantage of network telemetry over SNMP pulls?...
Question 194: DoS attacks are categorized as what?...
Question 195: Which service allows a user export application usage and per...
Question 196: Drag and drop the solutions from the left onto the solution'...
Question 197: Refer to the exhibit. (Exhibit) Which command was used to di...
Question 198: An engineer is configuring guest WLAN access using Cisco ISE...
Question 199: An engineer is implementing Cisco CES in an existing Microso...
Question 200: What is an attribute of the DevSecOps process?...
Question 201: An administrator is implementing management plane protection...
Question 202: Which solution protects hybrid cloud deployment workloads wi...
Question 203: What are two characteristics of the RESTful architecture use...
Question 204: How does the Cisco WSA enforce bandwidth restrictions for we...
Question 205: Which attack is preventable by Cisco ESA but not by the Cisc...
Question 206: What is a functional difference between Cisco AMP for Endpoi...
Question 207: What is a benefit of using Cisco FMC over Cisco ASDM?...
Question 208: What is a characteristic of Dynamic ARP Inspection?...
Question 209: An organization is trying to improve their Defense in Depth ...
Question 210: Refer to the exhibit. (Exhibit) Refer to the exhibit. A Cisc...
Question 211: Which feature within Cisco ISE verifies the compliance of an...
Question 212: For which two conditions can an endpoint be checked using IS...
Question 213: Which attack type attempts to shut down a machine or network...
Question 214: Which type of data does the Cisco Stealthwatch system collec...
Question 215: A network administrator configures Dynamic ARP Inspection on...
Question 216: A security engineer must add destinations into a destination...
Question 217: Which IPS engine detects ARP spoofing?...
Question 218: A large organization wants to deploy a security appliance in...
Question 219: A customer has various external HTTP resources available inc...
Question 220: Which Cisco security solution secures public, private, hybri...
Question 221: How many interfaces per bridge group does an ASA bridge grou...
Question 222: Which PKI enrollment method allows the user to separate auth...
Question 223: When choosing an algorithm to us, what should be considered ...
Question 224: An engineer needs to configure a Cisco Secure Email Gateway ...
Question 225: An engineer must configure Cisco AMP for Endpoints so that i...
Question 226: An engineer is configuring Cisco WSA and needs to enable a s...
Question 227: In which cloud services model is the customer responsible fo...
Question 228: What are two reasons for implementing a multifactor authenti...
Question 229: Which function is the primary function of Cisco AMP threat G...
Question 230: Which Cisco security solution stops exfiltration using HTTPS...
Question 231: (Exhibit) Refer to the exhibit. When configuring this access...
Question 232: Which information is required when adding a device to Firepo...
Question 233: Where are individual sites specified to be block listed in C...
Question 234: What are the two most commonly used authentication factors i...
Question 235: Which feature is supported when deploying Cisco ASAv within ...
Question 236: An administrator is configuring N I P on Cisco ASA via ASDM ...
Question 237: An engineer integrates Cisco FMC and Cisco ISE using pxGrid ...
Question 238: Which policy represents a shared set of features or paramete...
Question 239: What are two functionalities of SDN Northbound APIs? (Choose...
Question 240: Which technology must be used to implement secure VPN connec...
Question 241: In which situation should an Endpoint Detection and Response...
Question 242: An engineer is configuring IPsec VPN and needs an authentica...
Question 243: (Exhibit) Refer to the exhibit. What function does the API k...
Question 244: After deploying a Cisco ESA on your network, you notice that...
Question 245: What is the difference between a vulnerability and an exploi...
Question 246: (Exhibit) Refer to the exhibit. What is the result of the Py...
Question 247: A network engineer must create an access control list on a C...
Question 248: What are two benefits of Flexible NetFlow records? (Choose t...
Question 249: What are two Trojan malware attacks? (Choose two)...
Question 250: An engineer must deploy a Cisco Secure Web Appliance. Antima...
Question 251: Which type of encryption uses a public key and private key?...
Question 252: Which benefit does endpoint security provide the overall sec...
Question 253: Which two functions does the Cisco Advanced Phishing Protect...
Question 254: During a recent security audit a Cisco IOS router with a wor...
Question 255: While using Cisco Secure Firewall's Security Intelligence po...
Question 256: A network engineer is configuring a Cisco Catalyst switch. T...
Question 257: Which component of Cisco umbrella architecture increases rel...
Question 258: Which technology reduces data loss by identifying sensitive ...
Question 259: Based on the NIST 800-145 guide, which cloud architecture is...
Question 260: Refer to the exhibit. (Exhibit) An engineer configured wired...
Question 261: Which firewall mode does a Cisco Adaptive Security Appliance...
Question 262: An engineer must deploy Cisco Secure Email with Cloud URL An...
Question 263: Which attack gives unauthorized access to files on the web s...
Question 264: What is the difference between deceptive phishing and spear ...
Question 265: What is a difference between GETVPN and IPsec?...
Question 266: How does Cisco Umbrella archive logs to an enterprise owned ...
Question 267: What does the Cloudlock Apps Firewall do to mitigate securit...
Question 268: What is a feature of container orchestration?...
Question 269: Which two types of connectors are used to generate telemetry...
Question 270: Which feature of Cisco ASA allows VPN users to be postured a...
Question 271: An organization is implementing URL blocking using Cisco Umb...
Question 272: What is an advantage of the Cisco Umbrella roaming client?...
Question 273: A Cisco FTD engineer is creating a new IKEv2 policy called s...
Question 274: What are two DDoS attack categories? (Choose two)...
Question 275: An organization wants to improve its cybersecurity processes...
Question 276: An engineer needs to configure an access control policy rule...
Question 277: Which Secure Email Gateway implementation method segregates ...
Question 278: Which solution supports high availability in routed or trans...
Question 279: What is the role of Cisco Umbrella Roaming when it is instal...
Question 280: When a transparent authentication fails on the Web Security ...
Question 281: What is a difference between a DoS attack and a DDoS attack?...
Question 282: What is the process of performing automated static and dynam...
Question 283: Which technology is used to improve web traffic performance ...
Question 284: Which Cisco AMP feature allows an engineer to look back to t...
Question 285: When network telemetry is implemented, what is important to ...
Question 286: An organization received a large amount of SPAM messages ove...
Question 287: Which parameter is required when configuring a Netflow expor...
Question 288: What is a difference between weak passwords and missing encr...
Question 289: Which type of API is being used when a security application ...
Question 290: Which cloud service model offers an environment for cloud co...
Question 291: What is the purpose of a NetFlow version 9 template record?...
Question 292: Which service allows a user to export application usage and ...