How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?

How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?A . Reputation FilteringB . Layer-4 MonitoringC . Data Loss PreventionD . URL FilteringView AnswerAnswer: A

March 19, 2019 No Comments READ MORE +

How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?

How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?A . Reputation FilteringB . Layer-4 MonitoringC . Data Loss PreventionD . URL FilteringView AnswerAnswer: A

March 14, 2019 No Comments READ MORE +

Which feature of E-mail Security protects users from virus outbreaks using the Tabs database to quarantine suspicious messages?

Which feature of E-mail Security protects users from virus outbreaks using the Tabs database to quarantine suspicious messages?A . Antivirus defenseB . Outbreak fittersC . Data Loss PreventionD . Advanced Malware ProtectionView AnswerAnswer: B

March 12, 2019 No Comments READ MORE +

What two challenges do customers (ace in their Campus and Branch deployments? (Choose two)

What two challenges do customers (ace in their Campus and Branch deployments? (Choose two)A . Securing the entire infrastructureB . Stopping data breaches across campuses and branchesC . Protect data across multiple cloud applicationsD . Monitoring file behavior across a large set of endpointsE . Understanding what our users a*e...

March 10, 2019 No Comments READ MORE +

Which three are deployment options for E-mail Security? (Choose three.)

Which three are deployment options for E-mail Security? (Choose three.)A . ESAB . CESC . WSAvD . AMPE . ESAvF . WebRootView AnswerAnswer: A, B, E

March 8, 2019 No Comments READ MORE +

Which AMP feature is provided by fuzzy fingerprinting?

Which AMP feature is provided by fuzzy fingerprinting?A . Identifies specific instances of malware with a signature-based approachB . Automatically detects polymorphic variants of known malwareC . Provides recursive DNS lookup servicesD . Identifies new malware using statistical modeling and analytics enginesView AnswerAnswer: B

March 7, 2019 No Comments READ MORE +

Which three options are attack vectors protected by Email Security? (Choose three)

Which three options are attack vectors protected by Email Security? (Choose three)A . EndpointsB . Offline DevicesC . MobileD . E-mailE . VoicemailF . BackupsView AnswerAnswer: ACD

February 25, 2019 No Comments READ MORE +

What is a main benefit of Cisco's Clouldlock Data Loss Prevention feature?

What is a main benefit of Cisco's Clouldlock Data Loss Prevention feature?A . Reduces cost with easy implementation and installationB . Provides in depth cloud app analytics and trackingC . Allow organizations to retroactively identify malware within their environmentD . Includes 70+ out of the box policies for enforcement, such...

February 22, 2019 No Comments READ MORE +

Which AMP feature is provided by fuzzy fingerprinting?

Which AMP feature is provided by fuzzy fingerprinting?A . Identifies specific instances of malware with a signature-based approachB . Automatically detects polymorphic variants of known malwareC . Provides recursive DNS lookup servicesD . Identifies new malware using statistical modeling and analytics enginesView AnswerAnswer: B

February 15, 2019 No Comments READ MORE +

Which are two main features of FirePOWER Threat Defense? (Choose two.)

Which are two main features of FirePOWER Threat Defense? (Choose two.)A . Unify Images for more intuitive interface managementB . Provide malware detection score foe additional analyticsC . Deliver Data Loss Prevention through the virtual lockD . Offer intuitive interface including new management options and controlView AnswerAnswer: A, D

February 10, 2019 No Comments READ MORE +