Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Device_Management_Basics.html#ID-2242-0000069d
Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)A . blocked portsB . simple custom detectionsC . command and controlD . allowed applicationsE . URLView AnswerAnswer: BD Explanation: Reference: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter
Drag and drop the capabilities from the left onto the correct technologies on the right
DRAG DROP Drag and drop the capabilities from the left onto the correct technologies on the right. View AnswerAnswer:
How does Cisco Stealthwatch Cloud provide security for cloud environments?
How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection.B . It prevents exfiltration of sensitive data.C . It assigns Internet-based DNS protection for clients and servers.D . It facilitates secure connectivity between public and private networks.View AnswerAnswer: A Explanation: Reference: https://www.content.shi.com/SHIcom/ContentAttachmentImages/SharedResources/FBLP/Cisco/Cisco-091919-Simple-IT-Whitepaper.pdf
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...
Which two key and block sizes are valid for AES? (Choose two.)
Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: CD Explanation:...
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right
DRAG DROP Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/detecting_specific_threats.html