What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two. )
What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two. )A . dataB . sessionC . bufferD . statisticsE . verboseView AnswerAnswer: BD
which two tasks can the network discovery feature perform? (choose two)
which two tasks can the network discovery feature perform? (choose two)A . host discoveryB . Block trafficC . user discoveryD . reset connectionE . route trafficView AnswerAnswer: A, C
Which Cisco technology secures the network through malware filtering, category-based control, and reputation-based control?
Which Cisco technology secures the network through malware filtering, category-based control, and reputation-based control?A . Cisco ASA 5500 Series appliancesB . Cisco IPSC . Cisco remote-access VPNsD . Cisco WSAView AnswerAnswer: D
Which Cisco WSA is intended for deployment in organizations of up to 1500 users?
Which Cisco WSA is intended for deployment in organizations of up to 1500 users?A . WSA S370B . WSA S670C . WSA S370-2RUD . WSA S170View AnswerAnswer: D
With Cisco AMP for Endpoints on Windows, which three engines are available in the connector? (Choose three. )
With Cisco AMP for Endpoints on Windows, which three engines are available in the connector? (Choose three. )A . EthosB . TetraC . AnnosD . SperoE . TalosF . ClamAVView AnswerAnswer: ABD Explanation: http://www.cisco.com/c/en/us/products/collateral/security/fireamp-private-cloud-virtual-appliance/datasheet-c78-733180.html
Which Cisco Cloud Web Security tool provides URL categorization?
Which Cisco Cloud Web Security tool provides URL categorization?A . Cisco Dynamic Content Analysis EngineB . Cisco ScanSafeC . ASA Firewall ProxyD . Cisco Web Usage ControlView AnswerAnswer: D
Which two services must remain as on-premisses equipment when deploying a hybrid email solution? (choose two)
Which two services must remain as on-premisses equipment when deploying a hybrid email solution? (choose two)A . DDoSB . DLPC . antispamD . encryptionE . antivirusView AnswerAnswer: BD
Which two routing options are valid with cisco firePOWER threat Defense version 6.0?(choose two)
Which two routing options are valid with cisco firePOWER threat Defense version 6.0?(choose two)A . ECMP with up to three equal cost paths across multiple interfacesB . BGPv6C . BGPv4 with nonstop forwardingD . BGPv4 unicast address familyE . ECMP with up to four equal cost pathsView AnswerAnswer: A, D
What is difference between a Cisco Content Security Management virtual appliance and a physical appliance?
What is difference between a Cisco Content Security Management virtual appliance and a physical appliance?A . Migration between virtual appliance of varying sizes is possible, but physical appliances must be of equal size.B . The virtual appliance requires an additional license to run on a host.C . The virtual appliance...
Between the Cisco ASA configuration and the Cisco WSA configuration, what is true with respect to redirected ports?
The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). The simulator will provide access...