When using Cisco FirePOWFR Services for ASA, how is traffic directed form based Cisco ASA to the CiscoPOWER Services?

When using Cisco FirePOWFR Services for ASA, how is traffic directed form based Cisco ASA to the CiscoPOWER Services? A. SPAN port on a Cisco Catalyst switch. B. WCCP on the ASA. C. inline interface pair on the Cisco FirePOWER module. D. service policy on the ASA.View AnswerAnswer: A

March 19, 2019 No Comments READ MORE +

With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes the appliance?

With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes the appliance?A . transparentB . routedC . passiveD . inline setE . inline tapView AnswerAnswer: C

March 15, 2019 No Comments READ MORE +

In cisco firePOWER 5.x and 6.0, which type of traffic causes a web page to be displayed by the appliance when Block or Interactive Block is selected as an access control action?

In cisco firePOWER 5.x and 6.0, which type of traffic causes a web page to be displayed by the appliance when Block or Interactive Block is selected as an access control action?A . FTPB . decrypted HTTPC . encrypted HTTPD . unencrypted HHTPView AnswerAnswer: D

March 13, 2019 No Comments READ MORE +

Which piece of information is required to perform a policy trace for the Cisco WSA?

Which piece of information is required to perform a policy trace for the Cisco WSA?A . the destination IP address of the traceB . the source IP address of the traceC . the URL to traceD . authentication credentials to make the requestView AnswerAnswer: C

March 11, 2019 No Comments READ MORE +

Which website can be used to validate group information about connections that flow through Cisco CWS?

Which website can be used to validate group information about connections that flow through Cisco CWS?A . whoami.scansafe.comB . policytrace.scansafe.comC . policytrace.scansafe.netD . whoami.scansafe.netView AnswerAnswer: C

March 11, 2019 No Comments READ MORE +

An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration?

An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration?A . Inline Mode, Permit TrafficB . Inline Mode, Close TrafficC . Promiscuous Mode, Permit TrafficD . Promiscuous Mode, Close TrafficView AnswerAnswer: B

March 10, 2019 No Comments READ MORE +

Which three functions can Cisco Application Visibility and Control perform? (Choose three.)

Which three functions can Cisco Application Visibility and Control perform? (Choose three.)A . Validation of malicious trafficB . Traffic controlC . Extending Web Security to all computing devicesD . Application-level classificationE . MonitoringF . Signature tuningView AnswerAnswer: B, D, E

March 9, 2019 No Comments READ MORE +

What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?

What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?A . 192.168.1.1B . 192.168.1.2C . 192.168.1.3D . 192.168.1.4E . 192.168.1.5F . 192.168.8.8View AnswerAnswer: F

March 7, 2019 No Comments READ MORE +

When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?

When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?A . It is created every 24 hours and used for 24 hours.B . It is created every 24 hours, but the current KB is used.C . It is...

March 6, 2019 No Comments READ MORE +

Which Cisco Web Security Appliance design requires minimal change to endpoint devices?

Which Cisco Web Security Appliance design requires minimal change to endpoint devices?A . Transparent ModeB . Explicit Forward ModeC . Promiscuous ModeD . Inline ModeView AnswerAnswer: A

March 3, 2019 No Comments READ MORE +