Which three zones are used for anomaly detection? (Choose three.)

Which three zones are used for anomaly detection? (Choose three.)A . Internal zoneB . External zoneC . Illegal zoneD . Inside zoneE . Outside zoneF . DMZ zoneView AnswerAnswer: A, B, C

August 11, 2018 No Comments READ MORE +

The Cisco Email Security Appliance will reject messages from which domains?

The Cisco Email Security Appliance will reject messages from which domains?A . red. publicB . red. public and orange. publicC . red. public, orange. Public and yellow. publicD . orange. publicE . violet. publicF . violet. public and blue.publicG . None of the listed domainsView AnswerAnswer: C

August 9, 2018 No Comments READ MORE +

An engineer must deploy AMP with cloud protection. Which machine learning engine uses active heuristics?

An engineer must deploy AMP with cloud protection. Which machine learning engine uses active heuristics?A . SperoB . IOCsC . 1to1D . EthosView AnswerAnswer: A

August 8, 2018 No Comments READ MORE +

Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)

Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)A . If it is between -1 and +10, the email is acceptedB . If it is between +1 and +10, the email is acceptedC . If it is between -3 and -1, the...

August 2, 2018 No Comments READ MORE +

over which two ports does the ISR G2 connector for CWS support redirection of HTTP traffic? (choose tw0)

over which two ports does the ISR G2 connector for CWS support redirection of HTTP traffic? (choose tw0)A . TCP port 65535B . UDP port 8080C . TCP port 88D . TCP port 80 E,.UDP port 80View AnswerAnswer: A, D

August 1, 2018 No Comments READ MORE +

In cisco Firepower 6.0, which policy contains the button that allows you to access the network analysis policy?

In cisco Firepower 6.0, which policy contains the button that allows you to access the network analysis policy?A . Network discovery policyB . intrusion PolicyC . access control policyD . file policyView AnswerAnswer: C

July 31, 2018 No Comments READ MORE +

Which two types of software can be installed on a cisco ASA-5545-X appliance? (choose two)

Which two types of software can be installed on a cisco ASA-5545-X appliance? (choose two)A . cisco ASAvB . Cisco firePOWER ApplianceC . Cisco firePOWER servicesD . cisco ASAE . ciscofirePOWER management CenterView AnswerAnswer: C, D

July 30, 2018 No Comments READ MORE +

What is the function of the Web Proxy Auto Discovery protocol?

What is the function of the Web Proxy Auto Discovery protocol?A . It enables a web client's traffic flows to be redirected in real time.B . It enables web clients to dynamically resolve hostname records.C . It enables a web client to download a script or configuration file that is...

July 24, 2018 No Comments READ MORE +

A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature?

A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature?A . Show statistics virtual-sensorB . Show event alertC . Show alertD . Show versionView AnswerAnswer: A

July 24, 2018 No Comments READ MORE +

Which policy is used to capture host information on the Cisco Next Generation Intrusion Prevention System?

Which policy is used to capture host information on the Cisco Next Generation Intrusion Prevention System?A . network discoveryB . correlationC . intrusionD . access controlView AnswerAnswer: C

July 23, 2018 No Comments READ MORE +