<< Prev Question Next Question >>

Question 35/49

Which set of actions would you take to create a simple custom detection?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (49q)
Question 1: The Update Window allows you to perform which action?...
Question 2: Which option describes a requirement for using Remote File F...
Question 3: In a FireAMP Private Cloud installation, an administrator us...
Question 4: Where does an administrator go to get a copy of a fetched fi...
Question 5: What is the default command-line switch configuration, if yo...
Question 6: How can customers feed new intelligence such as files and ha...
Question 7: FireAMP reports can be distributed by which mechanism?...
Question 8: Which statement describes an advantage of cloud-based detect...
Question 9: When you are viewing information about a computer, what is d...
Question 10: Which option represents a configuration step on first use? R...
Question 11: Which of these can you use for two-step authentication?...
Question 12: Incident responders use which policy mode for outbreak contr...
Question 13: Which FireAMP capability can tell you how malware has spread...
Question 14: Which hosts merit special consideration for crafting a polic...
Question 15: Which statement is true about the Device Trajectory feature?...
Question 16: Which pair represents equivalent processes whose names diffe...
Question 17: From the Deployment screen, you can deploy agents via which ...
Question 18: A default FireAMP Private Cloud installation can accommodate...
Question 19: Which statement about two-step authentication is true?...
Question 20: What do policies enable you to do? Real 6 Cisco 500-275 Exam...
Question 21: Which feature allows retrospective detection?...
Question 22: Real 3 Cisco 500-275 Exam Which option is a detection techno...
Question 23: The FireAMP connector monitors the system for which type of ...
Question 24: Which tool can you use to query the history.db file?...
Question 25: For connector-to-FireAMP Private Cloud communication, which ...
Question 26: How many days' worth of data do the widgets on the dashboard...
Question 27: Where is the File Fetch context menu option available?...
Question 28: The Accounts menu contains items that are related to FireAMP...
Question 29: In a FireAMP Private Cloud installation, which server does a...
Question 30: If a file's SHA-256 hash is sent to the cloud, but the cloud...
Question 31: Which disposition can be returned in response to a malware c...
Question 32: Which type of activity is shown in the Device Trajectory pag...
Question 33: What is the first system that is infected with a particular ...
Question 34: The FireAMP Mobile endpoint connector currently supports whi...
Question 35: Which set of actions would you take to create a simple custo...
Question 36: Which question should be in your predeployment checklist?...
Question 37: The FireAMP connector supports which proxy type?...
Question 38: Which information does the File Trajectory feature show?...
Question 39: Advanced custom signatures are written using which type of s...
Question 40: Real 4 Cisco 500-275 Exam How does application blocking enha...
Question 41: When discussing the FireAMP product, which term does the acr...
Question 42: Which statement describes an advantage of the FireAMP produc...
Question 43: What is the default clean disposition cache setting?...
Question 44: In a FireAMP Private Cloud installation, deployed connectors...
Question 45: File information is sent to the Sourcefire Collective Securi...
Question 46: What is a valid data source for DFC Windows connector policy...
Question 47: Which statement represents a best practice for deploying on ...
Question 48: Custom whitelists are used for which purpose?...
Question 49: When a user initiates a scan, which types of scan are availa...