Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)A . The units must be the same versionB . Both devices can be part of a different group that must be in the same domain when configured within the FMC.C . The units...
Which configuration addresses this concern?
A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration...
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?A . Windows domain controllerB . auditC . triageD . protectionView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214933-amp-for-endpoints- deployment-methodology.html
Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?
Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?A . configure coredump packet-engine enableB . capture-trafficC . captureD . capture WORDView AnswerAnswer: C Explanation: Reason: the command "capture-traffic" is used for SNORT Engine Captures. To capture a LINA Engine Capture,...
Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used
DRAG DROP Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used. View AnswerAnswer: Explanation: Explanation Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_management_center_high_availability.html#id_32288
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)A . application blockingB . simple custom detectionC . file repositoryD . exclusionsE . application whitelistingView AnswerAnswer: AB
Which widget should be configured to provide this visibility on the Cisco Firepower dashboards?
After using Firepower for some time and learning about how it interacts with the network, an administrator is trying to correlate malicious activity with a user. Which widget should be configured to provide this visibility on the Cisco Firepower dashboards?A . Custom AnalysisB . Current StatusC . Current SessionsD ....
Which group within Cisco does the Threat Response team use for threat analysis and research?
Which group within Cisco does the Threat Response team use for threat analysis and research?A . Cisco Deep AnalyticsB . OpenDNS GroupC . Cisco Network ResponseD . Cisco TalosView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/products/security/threat-response.html#~benefits
Which protocol establishes network redundancy in a switched Firepower device deployment?
Which protocol establishes network redundancy in a switched Firepower device deployment?A . STPB . HSRPC . GLBPD . VRRPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_threat_defense_high_availability.html
What is the cause of this issue?
A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?A . The malware license has not been applied to the Cisco FTD.B . The Cisco FMC cannot reach the...