Remote clients have reported application slowness. The remote site has one circuit that is highly utilized and a second circuit with nearly zero utilization. The business unit has asked to have applications load shared over two WAN links. An engineer has decided to deploy cisco Application Visibility and Control to better utilize the existing WAN links and to understand the traffic flows. Which configuration provides application deep packet inspection?
Remote clients have reported application slowness. The remote site has one circuit that is highly utilized and a second circuit with nearly zero utilization. The business unit has asked to have applications load shared over two WAN links. An engineer has decided to deploy cisco Application Visibility and Control to...
What is the default IP range of the external zone?
What is the default IP range of the external zone?A . 0.0.0.0 0.0.0.0B . 0.0.0.0 - 255.255.255.255C . 0.0.0.0/8D . The network of the management interfaceView AnswerAnswer: B
In a Cisco FirePOWER instrusion policy, which two event actions can be configured on a rule? (Choose two.)
In a Cisco FirePOWER instrusion policy, which two event actions can be configured on a rule? (Choose two.)A . drop packetB . drop and generateC . drop connectionD . capture trigger packetE . generate eventsView AnswerAnswer: B
A network engineer wants to deploy a virtual cisco ESA and wants protection against email-based threats, email encryption, and clustering. Which software license bundle must the network engineer purchase to access these components?
A network engineer wants to deploy a virtual cisco ESA and wants protection against email-based threats, email encryption, and clustering. Which software license bundle must the network engineer purchase to access these components?A . cisco email security PremiumB . cisco email security Hybrid EssentialC . cisco email security advansedD ....
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data within a network perimeter?
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data within a network perimeter?A . cloud web servicesB . network AMPC . private cloudD . public cloudView AnswerAnswer: C
In WSA , which two pieces of information are required to implement transparent user identification using Context Directory Agent? (Choose two.)
In WSA , which two pieces of information are required to implement transparent user identification using Context Directory Agent? (Choose two.)A . the server name where Context Directory Agent is installedB . the server name of the global catalog domain controllerC . the backup Context Directory AgentD . the shared...
An engineer is configuring a Cisco Email Security Appliance (ESA) and chooses "Preferred" as the settings for TLS on a HAT Mail Flow Policy. Which result occurs?.
An engineer is configuring a Cisco Email Security Appliance (ESA) and chooses "Preferred" as the settings for TLS on a HAT Mail Flow Policy. Which result occurs?.A . TLS is allowed for outgoing connections to MTAs. Connection to the listener require encrypted Simple Mail Transfer Protocol conversationsB . TLS is...
In which two places can thresholding settings be configured? (Choose two.)
In which two places can thresholding settings be configured? (Choose two.)A . globally, per intrusion policyB . globally, within the network analysis policyC . on each access control ruleD . on each IPS ruleE . per preprocessor, within the network analysis policyView AnswerAnswer: CD
What is the maximum number of recipients per hour that the Cisco Email Security Appliance will accept from the green. public domain?
What is the maximum number of recipients per hour that the Cisco Email Security Appliance will accept from the green. public domain?A . 0B . 1C . 20D . 25E . 50F . 5000G . UnlimitedView AnswerAnswer: C
When the WSA policy trace tool is used to make a request to the proxy, where is the request logged?
When the WSA policy trace tool is used to make a request to the proxy, where is the request logged?A . proxy logsB . access logsC . authentication logsD . The request is not loggedView AnswerAnswer: B