Which protocols can be specified in a Snort rule header for analysis?
Which protocols can be specified in a Snort rule header for analysis?A . TCP, UDP, ICMP, and IPB . TCP, UDP, and IPC . TCP, UDP, and ICMPD . TCP, UDP, ICMP, IP, and ESPE . TCP and UDPView AnswerAnswer: A
A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature?
A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature?A . Show statistics virtual-sensorB . Show event alertC . Show alertD . Show versionView AnswerAnswer: A
Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)
Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)A . passB . trustC . monitorD . allowE . permitF . inspectView AnswerAnswer: BCD Explanation: http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AC-Rules-Tuning-Overview.html
Access the configuration of the Cisco Email Security Appliance using the MailFlowPolicies tab. Within the GUI, you can navigate between the Host Access Table Overview and Mail Flow Policies tables. You can also navigate to the individual Mail Flow Policies and Sender Groups that are configured on the appliance.
Access the configuration of the Cisco Email Security Appliance using the MailFlowPolicies tab. Within the GUI, you can navigate between the Host Access Table Overview and Mail Flow Policies tables. You can also navigate to the individual Mail Flow Policies and Sender Groups that are configured on the appliance. Consider...
What is the CLI command to create a new Message Filter in a Cisco Email Security Appliance?
What is the CLI command to create a new Message Filter in a Cisco Email Security Appliance?A . filterconfigB . filters newC . messagefiltersD . policyconfig-- inbound or outbound-- filtersView AnswerAnswer: B
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?A . health policyB . system policyC . correlation policyD . access control policyE . health awareness policyView AnswerAnswer: A
Which type of interface do you configure to receive traffic from a switch or tap, promiscuously, on a cisco firePOWER device?
Which type of interface do you configure to receive traffic from a switch or tap, promiscuously, on a cisco firePOWER device?A . inline setB . transparentC . RoutedD . PassiveView AnswerAnswer: D
Which two methods are used to deploy transparent mode traffic redirection? (Choose two)
Which two methods are used to deploy transparent mode traffic redirection? (Choose two)A . Microsoft GPOB . policy-based routingC . DHCP serverD . PAC filesE . Web Cache Communication ProtocolView AnswerAnswer: BE
Cisco’s ASA CX includes which two URL categories? (Choose two.)
Cisco’s ASA CX includes which two URL categories? (Choose two.)A . Proxy AvoidanceB . DropboxC . Hate SpeechD . FacebookE . Social NetworkingF . Instant Messaging and Video MessagingView AnswerAnswer: C, E
When creating an SSL policy on Cisco FirePOWER, which three options do you have
When creating an SSL policy on Cisco FirePOWER, which three options do you haveA . do not decryptB . trustC . allowD . block with resetE . blockF . encryptView AnswerAnswer: ADE Explanation: http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/200202-Configuration-of-an-SSL-Inspection-Polic.html