Which two statements about Cisco Cloud Web Security functionality are true? (Choose two.)
Which two statements about Cisco Cloud Web Security functionality are true? (Choose two.) A. It integrates with Cisco Integrated Service Routers. B. It supports threat avoidance and threat remediation. C. It extends web security to the desktop, laptop, and PDA. D. It integrates with Cisco ASA Firewalls.View AnswerAnswer: A, D
What CLI command configures IP-based access to restrict GUI and CLI access to a Cisco Email Security appliance's administrative interface?
What CLI command configures IP-based access to restrict GUI and CLI access to a Cisco Email Security appliance's administrative interface?A . adminaccessconfigB . sshconfigC . sslconfigD . ipaccessconfigView AnswerAnswer: A
Which four statements are correct regarding management access to a Cisco Intrusion Prevention System? (Choose four.)
Which four statements are correct regarding management access to a Cisco Intrusion Prevention System? (Choose four.)A . The Telnet protocol is enabled by defaultB . The Telnet protocol is disabled by defaultC . HTTP is enabled by defaultD . HTTP is disabled by defaultE . SSH is enabled by defaultF...
What are three best practices for a Cisco Intrusion Prevention System? (Choose three.)
What are three best practices for a Cisco Intrusion Prevention System? (Choose three.)A . Checking for new signatures every 4 hoursB . Checking for new signatures on a staggered scheduleC . Automatically updating signature packsD . Manually updating signature packsE . Group tuning of signaturesF . Single tuning of signaturesView...
Which port is used for CLI Secure shell access?
Which port is used for CLI Secure shell access?A . Port 23B . Port 25C . Port 22D . Port 443View AnswerAnswer: C
An engineer wants to improve web traffic performance by proxy caching. Which technology provides this improvement?
An engineer wants to improve web traffic performance by proxy caching. Which technology provides this improvement?A . FirepowerB . FireSIGTC . WSAD . ASAView AnswerAnswer: C
When using Cisco AMP for Networks, which feature copies a file to the Cisco AMP cloud for analysis?
When using Cisco AMP for Networks, which feature copies a file to the Cisco AMP cloud for analysis?A . Spero analysisB . dynamic analysisC . sandbox analysisD . malware analysisView AnswerAnswer: B
Which CLI command is used to generate firewall debug messages on a Cisco FirePOWER sensor?
Which CLI command is used to generate firewall debug messages on a Cisco FirePOWER sensor?A . system support ssl-debugB . system support firewall-engine-debugC . system support capture-trafficD . system support platformView AnswerAnswer: C
Which type of policy is used to define the scope for applications that are running on hosts?
Which type of policy is used to define the scope for applications that are running on hosts?A . access control policy.B . application awareness policy.C . application detector policy.D . network discovery policy.View AnswerAnswer: C
Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?
Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?A . custom file detectionB . hashingC . Spero engineD . dynamic analysisView AnswerAnswer: D