Loading questions...
Updated
Which information is required when adding a device to Firepower Management Center?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
What is a characteristic of Firepower NGIPS inline deployment mode?
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?
What is managed by Cisco Security Manager?
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?
An engineer notices traffic interruptions on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
What is a key difference between Cisco Firepower and Cisco ASA?
Which two mechanisms are used to control phishing attacks? (Choose two.)
DRAG DROP -
Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
Select and Place:
What is a benefit of using Cisco FMC over Cisco ASDM?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
A Cisco FirePower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)
What is a characteristic of a bridge group in a Cisco ASA Firewall running in transparent mode?
While using Cisco Firepower's Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)
What features does Cisco FTDv provide over Cisco ASAv?
A network engineer is deciding whether to use stateful or stateless failover when configuring two Cisco ASAs for high availability. What is the connection status in both cases?
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Which attack is commonly associated with C and C++ programming languages?
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
Which functions of an SDN architecture require southbound APIs to enable communication?
Which two behavioral patterns characterize a ping of death attack? (Choose two.)