<< Prev Question Next Question >>

Question 90/139

Access control policy rules can be configured to block based on the conditions that you specify in each rule. Which behavior block response do you use if you want to deny and reset the connection of HTTP traffic that meets the conditions of the access control rule?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (139q)
Question 1: The Update Window allows you to perform which action?...
Question 2: Which feature of content security enables administrators to ...
Question 3: Which two solutions are main components of Cisco Content Sec...
Question 4: Which pair represents equivalent processes whose names diffe...
Question 5: Which option represents a configuration step on first use?...
Question 6: In a FireAMP Private Cloud installation, an administrator us...
Question 7: After a user prepares and sends an encrypted message to a re...
Question 8: FireSIGHT recommendations appear in which layer of the Polic...
Question 9: The Accounts menu contains items that are related to FireAMP...
Question 10: Which option is true of the Packet Information portion of th...
Question 11: Which action can you take from the Detections/Quarantine scr...
Question 12: Which statement describes the meaning of a red health status...
Question 13: Which interface type allows for VLAN tagging?...
Question 14: From the Deployment screen, you can deploy agents via which ...
Question 15: Cisco Secure Access Solutions delivers a secure connection t...
Question 16: Which Cisco Identity Services Engine feature controls access...
Question 17: Remote access to the Defense Center database has which chara...
Question 18: The collection of health modules and their settings is known...
Question 19: When adding source and destination ports in the Ports tab of...
Question 20: Which option is a detection technology that is used by FireA...
Question 21: Which three solutions are Cisco Secure Access solutions? (Ch...
Question 22: The FireAMP connector supports which proxy type?...
Question 23: Which two features of Cisco AnyConnect contribute to secure ...
Question 24: Where does an administrator go to get a copy of a fetched fi...
Question 25: What is a valid data source for DFC Windows connector policy...
Question 26: Where is the File Fetch context menu option available?...
Question 27: Cisco network security offers unmatched visibility and contr...
Question 28: Which option can you enter in the Search text box to look fo...
Question 29: In the Cisco future solutions architecture framework, the se...
Question 30: Which integrated technology solution deals with application-...
Question 31: What do policies enable you to do?...
Question 32: In a FireAMP Private Cloud installation, which server does a...
Question 33: Advanced custom signatures are written using which type of s...
Question 34: Which two options are benefits of Cisco Application Visibili...
Question 35: Which three options describe the main problems with traditio...
Question 36: Context Explorer can be accessed by a subset of user roles. ...
Question 37: Which Cisco security technology delivers the best real-time ...
Question 38: What does the whitelist attribute value "not evaluated" indi...
Question 39: On average, email security Outbreak Filters identify and sto...
Question 40: Which four solutions are Cisco network security solutions? (...
Question 41: Which Cisco Secure Access solution should you recommend to a...
Question 42: The IP address ::/0 is equivalent to which IPv4 address and ...
Question 43: Which option is one of the three methods of updating the IP ...
Question 44: Which Sourcefire feature allows you to send traffic directly...
Question 45: What does packet latency thresholding measure?...
Question 46: Which two features of AMP are available in Cisco AMP for Net...
Question 47: Custom whitelists are used for which purpose?...
Question 48: Which option is not a characteristic of dashboard widgets or...
Question 49: Which statement represents detection capabilities of the HTT...
Question 50: Which event source can have a default workflow configured?...
Question 51: Which information does the File Trajectory feature show?...
Question 52: In a FireAMP Private Cloud installation, deployed connectors...
Question 53: Which statement describes an advantage of cloud-based detect...
Question 54: Which VPN offering removes the need for point-to-point GRE t...
Question 55: Which Cisco Secure Access solution provides centralized poli...
Question 56: When configuring an LDAP authentication object, which server...
Question 57: Cisco Email Security is ideal for which type of customer?...
Question 58: Which option describes the two basic components of Sourcefir...
Question 59: Which statement is true about the Device Trajectory feature?...
Question 60: Which Cisco technology solution can resolve a customer's ina...
Question 61: What is the default command-line switch configuration, if yo...
Question 62: The FireAMP connector monitors the system for which type of ...
Question 63: What is the default clean disposition cache setting?...
Question 64: Which solution is the most effective for virus cleanup?...
Question 65: A user discovery agent can be installed on which platform?...
Question 66: Which two add-ons are available for the AnyConnect Premium l...
Question 67: If a file's SHA-256 hash is sent to the cloud, but the cloud...
Question 68: Which component of Cisco network security is updated after a...
Question 69: Which two features are components of the Cisco Web Security ...
Question 70: Correlation policy rules allow you to construct criteria for...
Question 71: Which type of activity is shown in the Device Trajectory pag...
Question 72: Which statement regarding user exemptions is true?...
Question 73: Which option is a remediation module that comes with the Sou...
Question 74: Which option best describes granular app control using appli...
Question 75: Which interface type allows for bypass mode?...
Question 76: FireAMP reports can be distributed by which mechanism?...
Question 77: Which FireAMP capability can tell you how malware has spread...
Question 78: The gateway VPN feature supports which deployment types?...
Question 79: For connector-to-FireAMP Private Cloud communication, which ...
Question 80: Which two advanced malware protection features are available...
Question 81: Which feature allows retrospective detection?...
Question 82: Which option is derived from the discovery component of Fire...
Question 83: How do you configure URL filtering?...
Question 84: Which disposition can be returned in response to a malware c...
Question 85: How does application blocking enhance security?...
Question 86: When you are viewing information about a computer, what is d...
Question 87: Which statement describes an advantage of the FireAMP produc...
Question 88: What are the two categories of variables that you can config...
Question 89: Which statement is true when adding a network to an access c...
Question 90: Access control policy rules can be configured to block based...
Question 91: Context Explorer can be accessed by a subset of user roles. ...
Question 92: Which statement is true regarding malware blocking over HTTP...
Question 93: Consider the process that begins with file retrospection, co...
Question 94: Host criticality is an example of which option?...
Question 95: Which statement is true when network traffic meets the crite...
Question 96: What is the maximum timeout value for a browser session?...
Question 97: Which mechanism should be used to write an IPS rule that foc...
Question 98: Where do you configure widget properties?...
Question 99: How many days' worth of data do the widgets on the dashboard...
Question 100: Which policy controls malware blocking configuration?...
Question 101: Which statement is true concerning static NAT?...
Question 102: Incident responders use which policy mode for outbreak contr...
Question 103: One of the goals of geolocation is to identify which option?...
Question 104: Which three values should you use to position Cisco security...
Question 105: When you are editing an intrusion policy, how do you know th...
Question 106: Which hosts merit special consideration for crafting a polic...
Question 107: Which feature is a primary feature of Cisco AnyConnect?...
Question 108: Which option is used to implement suppression in the Rule Ma...
Question 109: In addition to the discovery of new hosts, FireSIGHT can als...
Question 110: Controlling simultaneous connections is a feature of which t...
Question 111: Which two features are part of site-to-site VPN? (Choose two...
Question 112: Reputation filtering performs which two functions? (Choose t...
Question 113: What is the main reason that customers need Cisco Secure Acc...
Question 114: Which option describes a requirement for using Remote File F...
Question 115: Why do companies need Cisco Cyber Threat Defense?...
Question 116: Which Cisco ASA Next-Generation Firewall service restricts w...
Question 117: On average, how many pieces of new malware are created every...
Question 118: What are two reasons why companies need Cisco Unified Access...
Question 119: Which statement about two-step authentication is true?...
Question 120: The FireAMP Mobile endpoint connector currently supports whi...
Question 121: FireSIGHT uses three primary types of detection to understan...
Question 122: How can customers feed new intelligence such as files and ha...
Question 123: Alert priority is established in which way?...
Question 124: Which two business use trends have surfaced in the last five...
Question 125: Which feature of the Cisco security appliance provides "who-...
Question 126: Which statement represents a best practice for deploying on ...
Question 127: The current Cisco comprehensive framework solutions are divi...
Question 128: When a user initiates a scan, which types of scan are availa...
Question 129: Which tool can you use to query the history.db file?...
Question 130: If a customer complains that employees access websites for w...
Question 131: When configuring FireSIGHT detection, an administrator would...
Question 132: Which list identifies the possible types of alerts that the ...
Question 133: Which Cisco IPS feature adapts in real time to detect and bl...
Question 134: A one-to-many type of scan, in which an attacker uses a sing...
Question 135: What is the primary reason that customers need content secur...
Question 136: Which component of Cisco network security builds on basic fi...
Question 137: Which set of actions would you take to create a simple custo...
Question 138: Why do companies need the quickly scalable Cisco Secure Data...
Question 139: Which option transmits policy-based alerts such as SNMP and ...