Topic 1: Exam Pool A
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
A.
Correlation
B.
Intrusion
C.
Access Control
D.
Network Discovery
Network Discovery
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmcconfigguide-
v64/introduction_to_network_discovery_and_identity.html
What are two benefits of Flexible NetFlow records? (Choose two)
A.
They allow the user to configure flow information to perform customized traffic
identification
B.
They provide attack prevention by dropping the traffic
C.
They provide accounting and billing enhancements
D.
They converge multiple accounting technologies into one accounting mechanism
E.
They provide monitoring of a wider range of IP packet information from Layer 2 to 4
They allow the user to configure flow information to perform customized traffic
identification
They converge multiple accounting technologies into one accounting mechanism
Reference:
https://www.cisco.com/en/US/docs/ios/fnetflow/configuration/guide/cust_fnflow_rec_mon_e
xternal_docbase_0900e4b18055d0d2_4container_external_docbase_0900e4b181b413
d9.html#wp1057997Note: Traditional NetFlow allows us to monitor from Layer 2 to 4 but
Flexible NetFlow goes beyond theselayers.
Which component of Cisco umbrella architecture increases reliability of the service?
A.
Anycast IP
B.
AMP Threat grid
C.
Cisco Talos
D.
BGP route reflector
Cisco Talos
Which CLI command is used to register a Cisco FirePower sensor to Firepower
Management Center?
A.
configure system add <host><key>
B.
configure manager <key> add host
C.
configure manager delete
D.
configure manager add <host><key
configure manager add <host><key
What is the purpose of the certificate signing request when adding a new certificate for a
server?
A.
It is the password for the certificate that is needed to install it with
B.
It provides the server information so a certificate can be created and signed
C.
It provides the certificate client information so the server can authenticate against it
when installing
D.
It is the certificate that will be loaded onto the server
It provides the server information so a certificate can be created and signed
A certificate signing request (CSR) is one of the
first steps towards getting your own SSL Certificate. Generated on the same server you
plan to install the certificate on, the CSR contains information (e.g. common name,
organization, country) that the Certificate Authority (CA) will use to create your certificate. It
also contains the public key that will be included in your certificate and is signed with the
corresponding private key.
Page 24 out of 126 Pages |
Previous |