Which outbreak control method is used to accomplish this task?

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C

April 2, 2021 No Comments READ MORE +

What is the benefit of installing Cisco AMP for Endpoints on a network?

What is the benefit of installing Cisco AMP for Endpoints on a network?A . It provides operating system patches on the endpoints for security.B . It provides flow-based visibility for the endpoints' network connections.C . It protects endpoint systems through application control and real-time scanning.D . It enables behavioral analysis...

April 2, 2021 2 Comments READ MORE +

How does Cisco Advanced Phishing Protection protect users?

How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It uses machine learning and real-time behavior analytics.E . It utilizes sensors that send messages securely.View AnswerAnswer: C Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-email-security/at-a-glance-c45-740894.pd

April 2, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

April 2, 2021 No Comments READ MORE +

What are two benefits of Flexible NetFlow records? (Choose two)

What are two benefits of Flexible NetFlow records? (Choose two)A . They provide attack prevention by dropping the traffic.B . They allow the user to configure flow information to perform customized traffic identificationC . They provide accounting and billing enhancementsD . They provide monitoring of a wider range of IP...

April 2, 2021 2 Comments READ MORE +

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?A . to prevent theft of the endpointsB . because defense-in-depth stops at the networkC . to expose the endpoint to more...

April 2, 2021 No Comments READ MORE +

What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

What are the two types of managed Intercloud Fabric deployment models? (Choose two.)A . Public managedB . Service Provider managedC . Enterprise managedD . User managedE . Hybrid managedView AnswerAnswer: B C Explanation:

April 1, 2021 No Comments READ MORE +

What is the purpose of the My Devices Portal in a Cisco ISE environment?

What is the purpose of the My Devices Portal in a Cisco ISE environment?A . to manage and deploy antivirus definitions and patches on systems owned by the end userB . to register new laptops and mobile devicesC . to provision userless and agentless systemsD . to request a newly...

April 1, 2021 No Comments READ MORE +

What is the purpose of the certificate signing request when adding a new certificate for a server?

What is the purpose of the certificate signing request when adding a new certificate for a server?A . It is the password for the certificate that is needed to install it with.B . It provides the server information so a certificate can be created and signedC . It is the...

April 1, 2021 No Comments READ MORE +

What does the API do when connected to a Cisco security appliance?

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . gather network telemetry information from AMP for endpointsB . create an SNMP pull mechanism for managing AMPC . get the process and PID information from the computers in the networkD . gather the...

April 1, 2021 No Comments READ MORE +