When creating an SSL policy on Cisco FirePOWER, which three options do you have? A. do not decrypt B. trust C. allow D. block with reset E. block F. encrypt Show Answer
Which two TCP ports can allow the Cisco Firepower Management Center to communication with FireAMP cloud for file disposition
Which two TCP ports can allow the Cisco Firepower Management Center tocommunication with FireAMP cloud for file disposition information? (Choose two.) A. 8080 B. 22 C. 8305 D. 32137 E. 443 Show Answer
Which three access control actions permit traffic to pass through the device when usingCisco FirePOWER?
Which three access control actions permit traffic to pass through the device when usingCisco FirePOWER? (Choose three.) A. pass B. trust C. monitor D. allow E. permit F. inspect Show Answer
Which policy must you edit to make changes to the Snort preprocessors? A. access control policy B. network discovery policy C. intrusion policy D. file policy E. network analysis policy Show Answer
When deploying Cisco FirePOWER appliances, which option must you configure toenable VLAN rewriting? A. hybrid interfaces B. virtual switch C. virtual router D. inline set Show Answer
Which two methods are used to deploy transparent mode traffic redirection? (Choose two) A. Microsoft GPO B. policy-based routing C. DHCP server D. PAC files E. Web Cache Communication Protocol Show Answer
Which option lists the minimum requirements to deploy a managed device inline? A. passive interface, security zone, MTU, and link mode. B. passive interface, MTU, MDI/MDIX, and link mode. C. inline interfaces, MTU, MDI/MDIX, and link mode. D. inline interfaces, security zones, MTU, and link mode. Show Answer
Which feature of the Cisco Hybrid Email Security services enables you to create multiple email senders on a single Cisco ESA?
Which feature of the Cisco Hybrid Email Security services enables you to create multipleemail senders on a single Cisco ESA? A. Email Marketing Connector B. Virtual Routing and Forwarding C. Virtual Gateway D. Mail Flow Policy Connector E. Sender Groups Show Answer
Which Cisco AMP for Endpoints, what, is meant by simple custom detection? A. It is a rule for identifying a file that should be whitelisted by Cisco AMP. B. It is a method for identifying and quarantining a specific file by its SHA-256 hash. C. It is a feature for configuring a personal firewall. D. […]
Your organization has subscribed to the Cisco Cloud Web Security (CWS) service. Youhave been assigned the task of configuring the CWS connector on the ISR-G2 router at abranch office. Details of the configuration requirements include:. Content scanning should be enabled for traffic outbound from FastEthernet0/1. Explicitly specify 8080 for both the http and the https […]