A) Configure the Cisco ESA to reset the TCP connection.
B) Configure policies to stop and reject communication.
C) Configure the Cisco ESA to drop the malicious emails.
D) Configure policies to quarantine malicious emails.
Correct Answer
verified
Multiple Choice
A) aaa server radius dynamic-author
B) auth-type all
C) aaa new-model
D) ip device-tracking
Correct Answer
verified
Multiple Choice
A) Configure the Cisco WSA to modify policies based on the traffic seen.
B) Configure the Cisco ESA to modify policies based on the traffic seen.
C) Configure the Cisco WSA to receive real-time updates from Cisco Talos.
D) Configure the Cisco ESA to receive real-time updates from Cisco Talos.
Correct Answer
verified
Multiple Choice
A) flow insight variation
B) software package variation
C) interpacket variation
D) process details variation
Correct Answer
verified
Multiple Choice
A) reads the AD logs to map IP addresses to usernames
B) relays user authentication requests from Cisco WSA to AD
C) maintains users' group memberships
D) accepts user authentication requests on behalf of Cisco WSA for user identification
Correct Answer
verified
Multiple Choice
A) It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.
B) It discovers and controls cloud apps that are connected to a company's corporate environment.
C) It deletes any application that does not belong in the network.
D) It sends the application information to an administrator to act on.
Correct Answer
verified
Multiple Choice
A) Cisco ISE
B) Web Security Appliance
C) Security Manager
D) Cloudlock
Correct Answer
verified
Multiple Choice
A) create an SNMP pull mechanism for managing AMP
B) gather network telemetry information from AMP for endpoints
C) get the process and PID information from the computers in the network
D) gather the network interface information about the computers AMP sees
Correct Answer
verified
Multiple Choice
A) Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
B) Cisco FTDv with one management interface and two traffic interfaces configured
C) Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
D) Cisco FTDv with two management interfaces and one traffic interface configured
E) Cisco FTDv configured in routed mode and IPv6 configured
Correct Answer
verified
Multiple Choice
A) up to 16
B) up to 2
C) up to 4
D) up to 8
Correct Answer
verified
Multiple Choice
A) username and password
B) encryption method
C) device serial number
D) registration key
Correct Answer
verified
Multiple Choice
A) Cisco FMC uses Java while Cisco ASDM uses HTML5.
B) Cisco FMC provides centralized management while Cisco ASDM does not.
C) Cisco FMC supports pushing configurations to devices while Cisco ASDM does not.
D) Cisco FMC supports all firewall products whereas Cisco ASDM only supports Cisco ASA devices.
Correct Answer
verified
Multiple Choice
A) Threat Intelligence Director
B) Encrypted Traffic Analytics.
C) Cognitive Threat Analytics.
D) Cisco Talos Intelligence
Correct Answer
verified
Multiple Choice
A) It tracks flow-create, flow-teardown, and flow-denied events.
B) It provides stateless IP flow tracking that exports all records of a specific flow.
C) It tracks the flow continuously and provides updates every 10 seconds.
D) Its events match all traffic classes in parallel.
Correct Answer
verified
Multiple Choice
A) Certificate Trust List
B) Endpoint Trust List
C) Enterprise Proxy Service
D) Secured Collaboration Proxy
Correct Answer
verified
Multiple Choice
A) accounting
B) assurance
C) automation
D) authentication
E) encryption
Correct Answer
verified
Multiple Choice
A) The Cisco WSA responds with its own IP address only if it is running in explicit mode.
B) The Cisco WSA is configured in a web browser only if it is running in transparent mode.
C) The Cisco WSA responds with its own IP address only if it is running in transparent mode.
D) The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.
E) When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.
Correct Answer
verified
Multiple Choice
A) Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a database is manipulated.
B) Cross-site Scripting is an attack where code is executed from the server side, whereas SQL Injection is an attack where code is executed from the client side.
C) Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social engineering attack.
D) Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.
Correct Answer
verified
Multiple Choice
A) security scanning and theoretical vulnerabilities
B) development security
C) isolated security team
D) mandated security controls and check lists
Correct Answer
verified
Multiple Choice
A) trojan
B) MITM
C) phishing
D) malware
Correct Answer
verified
Showing 181 - 200 of 213
Related Exams