Topic 4: Integration
Which action should you take when Cisco Threat Response notifies you that AMP has
identified a file as malware?
A.
Add the malicious file to the block list
B.
Send a snapshot to Cisco for technical support
C.
Forward the result of the investigation to an external threat-analysis engine
D.
Wait for Cisco Threat Response to automatically block the malware
Add the malicious file to the block list
Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat
Containment?
A.
pxGrid
B.
FTD RTC
C.
FMC RTC
D.
ISEGrid
pxGrid
What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?
A.
VPN connections can be re-established only if the failed master unit recovers.
B.
Smart License is required to maintain VPN connections simultaneously across all cluster units.
C.
VPN connections must be re-established when a new master unit is elected.
D.
Only established VPN connections are maintained when a new master unit is elected.
VPN connections must be re-established when a new master unit is elected.
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/clustering/ftdcluster- solution.html#concept_g32_yml_y2b
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring
endpoint actively?
A.
Windows domain controller
B.
audit
C.
triage
D.
protection
audit
In which two ways do access control policies operate on a Cisco Firepower system?
(Choose two.)
A.
Traffic inspection can be interrupted temporarily when configuration changes are
deployed.
B.
The system performs intrusion inspection followed by file inspection.
C.
They can block traffic based on Security Intelligence data.
D.
File policies use an associated variable set to perform intrusion prevention.
E.
The system performs a preliminary inspection on trusted traffic to validate that it
matches the trusted parameters.
Traffic inspection can be interrupted temporarily when configuration changes are
deployed.
They can block traffic based on Security Intelligence data.
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmcconfig-guide-v60/Access_Control_Using_Intrusion_and_File_Policies.html
Page 15 out of 51 Pages |
Previous |