500-275 by Cisco - Page 1 | ExamCademy | ExamCademyAd
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ad
Support Examcademy
Your support keeps this platform running. Become a Supporter to remove all ads and unlock exclusive study tools.
Ad
Study without distractions
Supporters get zero ads, spaced-repetition Learn Mode, timed Exam Mode, and AI-powered explanations from AstroTutor.
Which information does the File Trajectory feature show?
- A the time that the scan was run
- B the name of the file
- C the hosts on which the file was seen and points in time where events occurred
- D the protocol
Which action can you take from the Detections/Quarantine screen?
- A Create a policy.
- B Restore the detected file.
- C Run a report.
- D Change computer group membership.
A default FireAMP Private Cloud installation can accommodate how many connectors over which period of time?
- A 100 connectors over a 15-day period
- B 1000 connectors over a 45-day period
- C 5000 connectors over a 10-day period
- D 500 connectors over a 30-day period
The Accounts menu contains items that are related to FireAMP console accounts. Which menu allows you to set the default group policy?
- A Audit Log
- B Users
- C Applications
- D Business
Which statement about two-step authentication is true?
- A It is the ability to use two separate passwords.
- B It is the ability to enable biometric authentication.
- C It is the ability to have a passphrase sent to a mobile device.
- D It is the ability to use a verification code in conjunction with the correct username and password.
Which of these can you use for two-step authentication?
- A the Apple Authenticator app
- B the Google Authenticator app
- C a SecurID token
- D any RFC 1918 compatible application
When a user initiates a scan, which types of scan are available as options?
- A scheduled scan, thorough scan, quick scan, network scan
- B jiffy scan, overnight scan, scan when available, vulnerability scan
- C flash scan, custom scan, full scan
- D none, because user-initiated scans are not allowed
Which tool can you use to query the history.db file?
- A Curl
- B FireAMP_Helper.vbs
- C cscript
- D SQLite
Which pair represents equivalent processes whose names differ, depending on the connector version that you are running?
- A immunet_protect and iptray
- B agent.exe and sfc.exe
- C TETRA and SPERO
- D ETHOS and SPERO
FireAMP reports can be distributed by which mechanism?
- A email
- B cloud sync
- C Windows file share
- D a Crystal Reports subscription
Custom whitelists are used for which purpose?
- A to specify which files to alert on
- B to specify which files to delete
- C to specify which files to ignore
- D to specify which files to sandbox
How does application blocking enhance security?
- A It identifies and logs usage.
- B It tracks application abuse.
- C It deletes identified applications.
- D It blocks vulnerable applications from running, until they are patched.
Which set of actions would you take to create a simple custom detection?
- A Add a SHA-256 value; upload a file to calculate a SHA-256 value; upload a text file that contains SHA-256 values.
- B Upload a packet capture; use a Snort rule; use a ClamAV rule.
- C Manually input the PE header data, the MD-5 hash, and a list of MD-5 hashes.
- D Input the file and file name.
Advanced custom signatures are written using which type of syntax?
- A Snort signatures
- B Firewall signatures
- C ClamAV signatures
- D bash shell
What is a valid data source for DFC Windows connector policy configuration?
- A SANS
- B NIST
- C Emerging Threats
- D Custom and Sourcefire
The Update Window allows you to perform which action?
- A identify which hosts need to be updated
- B email the user to download a new client
- C specify a timeframe when an upgrade can be started and stopped
- D update your cloud instance
The FireAMP connector supports which proxy type?
- A SOCKS6
- B HTTP_proxy
- C SOCKS5_filename
- D SOCKS7
In a FireAMP Private Cloud installation, which server does an administrator use to manage connector policy and view events?
- A opadmin.<your domain>.com
- B console.<your domain>.com
- C cloud.<your domain>.com
- D aws.<your domain>.com
Which disposition can be returned in response to a malware cloud lookup?
- A Dirty
- B Virus
- C Malware
- D Infected
The FireAMP Mobile endpoint connector currently supports which mobile OS device?
- A Firefox
- B HTML5
- C Android
- D iPhone
If a file's SHA-256 hash is sent to the cloud, but the cloud has never seen the hash before, which disposition is returned?
- A Clean
- B Neutral
- C Malware
- D Unavailable
Which statement describes an advantage of the FireAMP product?
- A Signatures are pushed to endpoints more quickly than other antivirus products.
- B Superior detection algorithms on the endpoint limit the amount of work the cloud must perform.
- C It provides enterprise visibility.
- D It relies on sandboxing.
Which feature allows retrospective detection?
- A Total Recall
- B Cloud Recall
- C Recall Alert
- D Recall Analysis
Which FireAMP capability can tell you how malware has spread in a network?
- A File Analysis
- B Threat Root Cause
- C File Trajectory
- D Heat Map
Which question should be in your predeployment checklist?
- A How often are backup jobs run?
- B Are any Linux servers being deployed?
- C Who are the users of the hosts on which you will deploy?
- D Which applications are installed on the hosts on which you will deploy?