Which two GUI options display users' activity in Cisco Web Security Appliance? (Choose two.)
Which two GUI options display users' activity in Cisco Web Security Appliance? (Choose two.)A . Web Security Manager Identity Identity NameB . Security Services ReportingC . Reporting UsersD . Reporting Reports by User LocationView AnswerAnswer: C, D
An engineer wants to cluster an existing ESA physical appliance with an ESA virtual appliance. Which statement is true?
An engineer wants to cluster an existing ESA physical appliance with an ESA virtual appliance. Which statement is true?A . This action is possible as long as the devices are running the identical AsyncOSB . This action is not possible for virtual appliancesC . This action is possible between different...
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?A . vulnerable softwareB . file analysisC . detectionsD . prevalenceE . threat root causeView AnswerAnswer: C
An engineer must architect an AMP private cloud deployment. What is the benefit of running in air-gaped mode?
An engineer must architect an AMP private cloud deployment. What is the benefit of running in air-gaped mode?A . Internet connection is not required for disposition.B . Database sync time is reduced.C . Disposition queries are done on AMP appliances.D . A dedicated server is needed to run amp-sync.View AnswerAnswer:...
What can Cisco Prime Security Manager (PRSM) be used to achieve?
What can Cisco Prime Security Manager (PRSM) be used to achieve?A . Configure and Monitor Cisco CX Application Visibility and Control, web filtering, access and decryption policiesB . Configure Cisco ASA connection limitsC . Configure TCP state bypass in Cisco ASA and IOSD . Configure Cisco IPS signature and monitor...
Which option lists the minimum requirements to deploy a managed device inline?
Which option lists the minimum requirements to deploy a managed device inline?A . passive interface, security zone, MTU, and link mode.B . passive interface, MTU, MDI/MDIX, and link mode.C . inline interfaces, MTU, MDI/MDIX, and link mode.D . inline interfaces, security zones, MTU, and link mode.View AnswerAnswer: A
Which three protocols are required when considering firewall rules email services using a Cisco Email Security Appliance?
Which three protocols are required when considering firewall rules email services using a Cisco Email Security Appliance?A . HTTPB . SMTPC . TFTPD . FTPE . DNSF . SNMPView AnswerAnswer: ABE
What traffic is not redirected by WCCP?
The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). The simulator will provide access...
The security team needs to limit the number of e-mails they receive from the Intellishield Alert Service. Which three parameters can they adjust to restrict alerts to specific product sets? (Choose three.)
The security team needs to limit the number of e-mails they receive from the Intellishield Alert Service. Which three parameters can they adjust to restrict alerts to specific product sets? (Choose three.)A . VendorB . Chassis/ModuleC . Device IDD . Service ContractE . Version/ReleaseF . Service Pack/PlatformView AnswerAnswer: A, E,...
Which five system management protocols are supported by the Cisco Intrusion Prevention System? (Choose five.)
Which five system management protocols are supported by the Cisco Intrusion Prevention System? (Choose five.)A . SNMPv2cB . SNMPv1C . SNMPv2D . SNMPv3E . SyslogF . SDEEG . SMTPView AnswerAnswer: A, B, C, F, G