<< Prev Question Next Question >>

Question 133/139

Which Cisco IPS feature adapts in real time to detect and block intrusions that range from never- before- seen worms to the most sophisticated and subtle criminal attacks?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (139q)
Question 1: The Update Window allows you to perform which action?...
Question 2: Which feature of content security enables administrators to ...
Question 3: Which two solutions are main components of Cisco Content Sec...
Question 4: Which pair represents equivalent processes whose names diffe...
Question 5: Which option represents a configuration step on first use?...
Question 6: In a FireAMP Private Cloud installation, an administrator us...
Question 7: After a user prepares and sends an encrypted message to a re...
Question 8: FireSIGHT recommendations appear in which layer of the Polic...
Question 9: The Accounts menu contains items that are related to FireAMP...
Question 10: Which option is true of the Packet Information portion of th...
Question 11: Which action can you take from the Detections/Quarantine scr...
Question 12: Which statement describes the meaning of a red health status...
Question 13: Which interface type allows for VLAN tagging?...
Question 14: From the Deployment screen, you can deploy agents via which ...
Question 15: Cisco Secure Access Solutions delivers a secure connection t...
Question 16: Which Cisco Identity Services Engine feature controls access...
Question 17: Remote access to the Defense Center database has which chara...
Question 18: The collection of health modules and their settings is known...
Question 19: When adding source and destination ports in the Ports tab of...
Question 20: Which option is a detection technology that is used by FireA...
Question 21: Which three solutions are Cisco Secure Access solutions? (Ch...
Question 22: The FireAMP connector supports which proxy type?...
Question 23: Which two features of Cisco AnyConnect contribute to secure ...
Question 24: Where does an administrator go to get a copy of a fetched fi...
Question 25: What is a valid data source for DFC Windows connector policy...
Question 26: Where is the File Fetch context menu option available?...
Question 27: Cisco network security offers unmatched visibility and contr...
Question 28: Which option can you enter in the Search text box to look fo...
Question 29: In the Cisco future solutions architecture framework, the se...
Question 30: Which integrated technology solution deals with application-...
Question 31: What do policies enable you to do?...
Question 32: In a FireAMP Private Cloud installation, which server does a...
Question 33: Advanced custom signatures are written using which type of s...
Question 34: Which two options are benefits of Cisco Application Visibili...
Question 35: Which three options describe the main problems with traditio...
Question 36: Context Explorer can be accessed by a subset of user roles. ...
Question 37: Which Cisco security technology delivers the best real-time ...
Question 38: What does the whitelist attribute value "not evaluated" indi...
Question 39: On average, email security Outbreak Filters identify and sto...
Question 40: Which four solutions are Cisco network security solutions? (...
Question 41: Which Cisco Secure Access solution should you recommend to a...
Question 42: The IP address ::/0 is equivalent to which IPv4 address and ...
Question 43: Which option is one of the three methods of updating the IP ...
Question 44: Which Sourcefire feature allows you to send traffic directly...
Question 45: What does packet latency thresholding measure?...
Question 46: Which two features of AMP are available in Cisco AMP for Net...
Question 47: Custom whitelists are used for which purpose?...
Question 48: Which option is not a characteristic of dashboard widgets or...
Question 49: Which statement represents detection capabilities of the HTT...
Question 50: Which event source can have a default workflow configured?...
Question 51: Which information does the File Trajectory feature show?...
Question 52: In a FireAMP Private Cloud installation, deployed connectors...
Question 53: Which statement describes an advantage of cloud-based detect...
Question 54: Which VPN offering removes the need for point-to-point GRE t...
Question 55: Which Cisco Secure Access solution provides centralized poli...
Question 56: When configuring an LDAP authentication object, which server...
Question 57: Cisco Email Security is ideal for which type of customer?...
Question 58: Which option describes the two basic components of Sourcefir...
Question 59: Which statement is true about the Device Trajectory feature?...
Question 60: Which Cisco technology solution can resolve a customer's ina...
Question 61: What is the default command-line switch configuration, if yo...
Question 62: The FireAMP connector monitors the system for which type of ...
Question 63: What is the default clean disposition cache setting?...
Question 64: Which solution is the most effective for virus cleanup?...
Question 65: A user discovery agent can be installed on which platform?...
Question 66: Which two add-ons are available for the AnyConnect Premium l...
Question 67: If a file's SHA-256 hash is sent to the cloud, but the cloud...
Question 68: Which component of Cisco network security is updated after a...
Question 69: Which two features are components of the Cisco Web Security ...
Question 70: Correlation policy rules allow you to construct criteria for...
Question 71: Which type of activity is shown in the Device Trajectory pag...
Question 72: Which statement regarding user exemptions is true?...
Question 73: Which option is a remediation module that comes with the Sou...
Question 74: Which option best describes granular app control using appli...
Question 75: Which interface type allows for bypass mode?...
Question 76: FireAMP reports can be distributed by which mechanism?...
Question 77: Which FireAMP capability can tell you how malware has spread...
Question 78: The gateway VPN feature supports which deployment types?...
Question 79: For connector-to-FireAMP Private Cloud communication, which ...
Question 80: Which two advanced malware protection features are available...
Question 81: Which feature allows retrospective detection?...
Question 82: Which option is derived from the discovery component of Fire...
Question 83: How do you configure URL filtering?...
Question 84: Which disposition can be returned in response to a malware c...
Question 85: How does application blocking enhance security?...
Question 86: When you are viewing information about a computer, what is d...
Question 87: Which statement describes an advantage of the FireAMP produc...
Question 88: What are the two categories of variables that you can config...
Question 89: Which statement is true when adding a network to an access c...
Question 90: Access control policy rules can be configured to block based...
Question 91: Context Explorer can be accessed by a subset of user roles. ...
Question 92: Which statement is true regarding malware blocking over HTTP...
Question 93: Consider the process that begins with file retrospection, co...
Question 94: Host criticality is an example of which option?...
Question 95: Which statement is true when network traffic meets the crite...
Question 96: What is the maximum timeout value for a browser session?...
Question 97: Which mechanism should be used to write an IPS rule that foc...
Question 98: Where do you configure widget properties?...
Question 99: How many days' worth of data do the widgets on the dashboard...
Question 100: Which policy controls malware blocking configuration?...
Question 101: Which statement is true concerning static NAT?...
Question 102: Incident responders use which policy mode for outbreak contr...
Question 103: One of the goals of geolocation is to identify which option?...
Question 104: Which three values should you use to position Cisco security...
Question 105: When you are editing an intrusion policy, how do you know th...
Question 106: Which hosts merit special consideration for crafting a polic...
Question 107: Which feature is a primary feature of Cisco AnyConnect?...
Question 108: Which option is used to implement suppression in the Rule Ma...
Question 109: In addition to the discovery of new hosts, FireSIGHT can als...
Question 110: Controlling simultaneous connections is a feature of which t...
Question 111: Which two features are part of site-to-site VPN? (Choose two...
Question 112: Reputation filtering performs which two functions? (Choose t...
Question 113: What is the main reason that customers need Cisco Secure Acc...
Question 114: Which option describes a requirement for using Remote File F...
Question 115: Why do companies need Cisco Cyber Threat Defense?...
Question 116: Which Cisco ASA Next-Generation Firewall service restricts w...
Question 117: On average, how many pieces of new malware are created every...
Question 118: What are two reasons why companies need Cisco Unified Access...
Question 119: Which statement about two-step authentication is true?...
Question 120: The FireAMP Mobile endpoint connector currently supports whi...
Question 121: FireSIGHT uses three primary types of detection to understan...
Question 122: How can customers feed new intelligence such as files and ha...
Question 123: Alert priority is established in which way?...
Question 124: Which two business use trends have surfaced in the last five...
Question 125: Which feature of the Cisco security appliance provides "who-...
Question 126: Which statement represents a best practice for deploying on ...
Question 127: The current Cisco comprehensive framework solutions are divi...
Question 128: When a user initiates a scan, which types of scan are availa...
Question 129: Which tool can you use to query the history.db file?...
Question 130: If a customer complains that employees access websites for w...
Question 131: When configuring FireSIGHT detection, an administrator would...
Question 132: Which list identifies the possible types of alerts that the ...
Question 133: Which Cisco IPS feature adapts in real time to detect and bl...
Question 134: A one-to-many type of scan, in which an attacker uses a sing...
Question 135: What is the primary reason that customers need content secur...
Question 136: Which component of Cisco network security builds on basic fi...
Question 137: Which set of actions would you take to create a simple custo...
Question 138: Why do companies need the quickly scalable Cisco Secure Data...
Question 139: Which option transmits policy-based alerts such as SNMP and ...