When using Cisco FirePOWFR Services for ASA, how is traffic directed form based Cisco ASA to the CiscoPOWER Services?
When using Cisco FirePOWFR Services for ASA, how is traffic directed form based Cisco ASA to the CiscoPOWER Services? A. SPAN port on a Cisco Catalyst switch. B. WCCP on the ASA. C. inline interface pair on the Cisco FirePOWER module. D. service policy on the ASA.View AnswerAnswer: A
With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes the appliance?
With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes the appliance?A . transparentB . routedC . passiveD . inline setE . inline tapView AnswerAnswer: C
In cisco firePOWER 5.x and 6.0, which type of traffic causes a web page to be displayed by the appliance when Block or Interactive Block is selected as an access control action?
In cisco firePOWER 5.x and 6.0, which type of traffic causes a web page to be displayed by the appliance when Block or Interactive Block is selected as an access control action?A . FTPB . decrypted HTTPC . encrypted HTTPD . unencrypted HHTPView AnswerAnswer: D
Which piece of information is required to perform a policy trace for the Cisco WSA?
Which piece of information is required to perform a policy trace for the Cisco WSA?A . the destination IP address of the traceB . the source IP address of the traceC . the URL to traceD . authentication credentials to make the requestView AnswerAnswer: C
Which website can be used to validate group information about connections that flow through Cisco CWS?
Which website can be used to validate group information about connections that flow through Cisco CWS?A . whoami.scansafe.comB . policytrace.scansafe.comC . policytrace.scansafe.netD . whoami.scansafe.netView AnswerAnswer: C
An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration?
An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration?A . Inline Mode, Permit TrafficB . Inline Mode, Close TrafficC . Promiscuous Mode, Permit TrafficD . Promiscuous Mode, Close TrafficView AnswerAnswer: B
Which three functions can Cisco Application Visibility and Control perform? (Choose three.)
Which three functions can Cisco Application Visibility and Control perform? (Choose three.)A . Validation of malicious trafficB . Traffic controlC . Extending Web Security to all computing devicesD . Application-level classificationE . MonitoringF . Signature tuningView AnswerAnswer: B, D, E
What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?
What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?A . 192.168.1.1B . 192.168.1.2C . 192.168.1.3D . 192.168.1.4E . 192.168.1.5F . 192.168.8.8View AnswerAnswer: F
When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?
When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?A . It is created every 24 hours and used for 24 hours.B . It is created every 24 hours, but the current KB is used.C . It is...
Which Cisco Web Security Appliance design requires minimal change to endpoint devices?
Which Cisco Web Security Appliance design requires minimal change to endpoint devices?A . Transparent ModeB . Explicit Forward ModeC . Promiscuous ModeD . Inline ModeView AnswerAnswer: A