When using Cisco FirePOWFR Services for ASA, how is traffic directed form based Cisco ASA to the CiscoPOWER Services? A. SPAN port on a Cisco Catalyst switch. B. WCCP on the ASA. C. inline interface pair on the Cisco FirePOWER module. D. service policy on the ASA. View Answer Answer: A...
With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes the appliance?
With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes the appliance?A . transparentB . routedC . passiveD . inline setE . inline tap View Answer Answer: C...
In cisco firePOWER 5.x and 6.0, which type of traffic causes a web page to be displayed by the appliance when Block or Interactive Block is selected as an access control action?
In cisco firePOWER 5.x and 6.0, which type of traffic causes a web page to be displayed by the appliance when Block or Interactive Block is selected as an access control action?A . FTPB . decrypted HTTPC . encrypted HTTPD . unencrypted HHTP View Answer Answer: D...
Which piece of information is required to perform a policy trace for the Cisco WSA?
Which piece of information is required to perform a policy trace for the Cisco WSA?A . the destination IP address of the traceB . the source IP address of the traceC . the URL to traceD . authentication credentials to make the request View Answer Answer: C...
Which website can be used to validate group information about connections that flow through Cisco CWS?
Which website can be used to validate group information about connections that flow through Cisco CWS?A . whoami.scansafe.comB . policytrace.scansafe.comC . policytrace.scansafe.netD . whoami.scansafe.net View Answer Answer: C...
An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration?
An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration?A . Inline Mode, Permit TrafficB . Inline Mode, Close TrafficC . Promiscuous Mode, Permit TrafficD . Promiscuous Mode, Close Traffic View Answer Answer: B...
Which three functions can Cisco Application Visibility and Control perform? (Choose three.)
Which three functions can Cisco Application Visibility and Control perform? (Choose three.)A . Validation of malicious trafficB . Traffic controlC . Extending Web Security to all computing devicesD . Application-level classificationE . MonitoringF . Signature tuning View Answer Answer: B, D, E...
What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?
What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?A . 192.168.1.1B . 192.168.1.2C . 192.168.1.3D . 192.168.1.4E . 192.168.1.5F . 192.168.8.8 View Answer Answer: F...
When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?
When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?A . It is created every 24 hours and used for 24 hours.B . It is created every 24 hours, but the current KB is used.C . It is created every 1 hour...
Continue readingWhich Cisco Web Security Appliance design requires minimal change to endpoint devices?
Which Cisco Web Security Appliance design requires minimal change to endpoint devices?A . Transparent ModeB . Explicit Forward ModeC . Promiscuous ModeD . Inline Mode View Answer Answer: A...