Join the discussion
Question 1/172
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)
Correct Answer: B,E
Add Comments
- Other Question (172q)
- Q1. Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (C...
- Q2. Which protocol establishes network redundancy in a switched Firepower device deployment?...
- Q3. A network engineer is extending a user segment through an FTD device for traffic inspectio...
- Q4. Which command should be used on the Cisco FTD CLI to capture all the packets that hit an i...
- Q5. What is the maximum SHA level of filtering that Threat Intelligence Director supports?...
- Q6. An organization has noticed that malware was downloaded from a website that does not curre...
- Q7. An engineer is configuring a cisco FTD appliance in IPS-only mode and needs to utilize fai...
- Q8. On the advanced tab under inline set properties, which allows interfaces to emulate a pass...
- Q9. After deploying a network-monitoring tool to manage and monitor networking devices in your...
- Q10. An organization has implemented Cisco Firepower without IPS capabilities and now wants to ...
- Q11. On the advanced tab under inline set properties, which allows interfaces to emulate a pass...
- Q12. Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (...
- Q13. With Cisco Firepower Threat Defense software, which interface mode must be configured to p...
- Q14. Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)...
- Q15. A company is deploying intrusion protection on multiple Cisco FTD appliances managed by Ci...
- Q16. An engineer is reviewing a ticket that requests to allow traffic for some devices that mus...
- Q17. In which two ways do access control policies operate on a Cisco Firepower system? (Choose ...
- Q18. An engineer has been tasked with using Cisco FMC to determine if files being sent through ...
- Q19. IT management is asking the network engineer to provide high-level summary statistics of t...
- Q20. Drag and drop the configuration steps from the left into the sequence on the right to enab...
- Q21. An administrator Is setting up a Cisco PMC and must provide expert mode access for a secur...
- Q22. When do you need the file-size command option during troubleshooting with packet capture?...
- Q23. The administrator notices that there is malware present with an .exe extension and needs t...
- Q24. Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)...
- Q25. An engineer is setting up a new Firepower deployment and is looking at the default FMC pol...
- Q26. Which two actions can be used in an access control policy rule? (Choose two.)...
- Q27. What is an advantage of adding multiple inline interface pairs to the same inline interfac...
- Q28. Which Cisco Firepower rule action displays an HTTP warning page?...
- Q29. Which action should be taken after editing an object that is used inside an access control...
- Q30. Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)...
- Q31. An administrator receives reports that users cannot access a cloud-hosted web server. The ...
- Q32. An organization has a Cisco IPS running in inline mode and is inspecting traffic for malic...
- Q33. An engineer is setting up a new Firepower deployment and is looking at the default FMC pol...
- Q34. An engineer is using the configure manager add <FMC IP> Cisc402098527 command to add...
- Q35. Which command must be run to generate troubleshooting files on an FTD?...
- Q36. An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned t...
- Q37. Which command-line mode is supported from the Cisco Firepower Management Center CLI?...
- Q38. Which two packet captures does the FTD LINA engine support? (Choose two.)...
- Q39. An administrator is attempting to add a new FTD device to their FMC behind a NAT device wi...
- Q40. What is the maximum bit size that Cisco FMC supports for HTTPS certificates?...
- Q41. While integrating Cisco Umbrella with Cisco Threat Response, a network security engineer w...
- Q42. Which Firepower feature allows users to configure bridges in routed mode and enables devic...
- Q43. An engineer wants to add an additional Cisco FTD Version 6.2.3 device to their current 6.2...
- Q44. Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring e...
- Q45. An organization does not want to use the default Cisco Firepower block page when blocking ...
- Q46. What is the advantage of having Cisco Firepower devices send events to Cisco Threat respon...
- Q47. Which feature within the Cisco FMC web interface allows for detecting, analyzing and block...
- Q48. Refer to the exhibit. (Exhibit) What must be done to fix access to this website while prev...
- Q49. A network administrator notices that inspection has been interrupted on all non-managed in...
- Q50. An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned t...
- Q51. An engineer is troubleshooting a file that is being blocked by a Cisco FTD device on the n...
- Q52. What is the result a specifying of QoS rule that has a rate limit that is greater than the...
- Q53. What is a valid Cisco AMP file disposition?
- Q54. What is the benefit of selecting the trace option for packet capture?...
- Q55. While configuring FTD, a network engineer wants to ensure that traffic passing through the...
- Q56. Which command should be used on the Cisco FTD CLI to capture all the packets that hit an i...
- Q57. Which interface type allows packets to be dropped?...
- Q58. Which command is run at the CLI when logged in to an FTD unit, to determine whether the un...
- Q59. An engineer is investigating connectivity problems on Cisco Firepower for a specific SGT. ...
- Q60. A network administrator is configuring Snort inspection policies and is seeing failed depl...
- Q61. A network engineer is extending a user segment through an FTD device for traffic inspectio...
- Q62. A network engineer implements a new Cisco Firepower device on the network to take advantag...
- Q63. An administrator must use Cisco FMC to install a backup route within the Cisco FTD to rout...
- Q64. Which firewall design will allow It to forward traffic at layers 2 and 3 for the same subn...
- Q65. Drag and drop the steps to restore an automatic device registration failure on the standby...
- Q66. Which Firepower feature allows users to configure bridges in routed mode and enables devic...
- Q67. What is a result of enabling Cisco FTD clustering?...
- Q68. Which CLI command is used to generate firewall debug messages on a Cisco Firepower?...
- Q69. A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two por...
- Q70. What is the benefit of selecting the trace option for packet capture?...
- Q71. An engineer has been tasked with using Cisco FMC to determine if files being sent through ...
- Q72. An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Ci...
- Q73. A network engineer is receiving reports of users randomly getting disconnected from their ...
- Q74. An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside in...
- Q75. Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment...
- Q76. A network engineer sets up a secondary Cisco FMC that is integrated with Cisco Security Pa...
- Q77. Which Cisco Firepower rule action displays an HTTP warning page?...
- Q78. When deploying a Cisco ASA Firepower module, an organization wants to evaluate the content...
- Q79. A security engineer must integrate an external feed containing STIX/TAXII data with Cisco ...
- Q80. Which CLI command is used to generate firewall debug messages on a Cisco Firepower?...
- Q81. An organization is migrating their Cisco ASA devices running in multicontext mode to Cisco...
- Q82. Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP ...
- Q83. An engineer is attempting to add a new FTD device to their FMC behind a NAT device with a ...
- Q84. Which group within Cisco does the Threat Response team use for threat analysis and researc...
- Q85. Which command must be run to generate troubleshooting files on an FTD?...
- Q86. Refer to the exhibit. (Exhibit) An administrator is looking at some of the reporting capab...
- Q87. Which command is entered in the Cisco FMC CLI to generate a troubleshooting file?...
- Q88. An engineer must configure the firewall to monitor traffic within a single subnet without ...
- Q89. What is the maximum SHA level of filtering that Threat Intelligence Director supports?...
- Q90. Which command should be used on the Cisco FTD CLI to capture all the packets that hit an i...
- Q91. When do you need the file-size command option during troubleshooting with packet capture?...
- Q92. Which command is run at the CLI when logged in to an FTD unit, to determine whether the un...
- Q93. In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot ...
- Q94. What are the minimum requirements to deploy a managed device inline?...
- Q95. Refer to the exhibit. (Exhibit) An administrator is looking at some of the reporting capab...
- Q96. An administrator receives reports that users cannot access a cloud-hosted web server. The ...
- Q97. An engineer is configuring a second Cisco FMC as a standby device but is unable to registe...
- Q98. An organization recently implemented a transparent Cisco FTD in their network. They must e...
- Q99. Drag and drop the steps to restore an automatic device registration failure on the standby...
- Q100. An engineer is implementing Cisco FTD in the network and is determining which Firepower mo...
- Q101. An engineer wants to connect a single IP subnet through a Cisco FTD firewall and enforce p...
- Q102. A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious...
- Q103. A Cisco FMC administrator wants to configure fastpathing of trusted network traffic to inc...
- Q104. What is the difference between inline and inline tap on Cisco Firepower?...
- Q105. An organization has a compliancy requirement to protect servers from clients, however, the...
- Q106. What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment...
- Q107. A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires t...
- Q108. The event dashboard within the Cisco FMC has been inundated with low priority intrusion dr...
- Q109. Which two dynamic routing protocols are supported in Firepower Threat Defense without usin...
- Q110. Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose ...
- Q111. A network administrator is configuring an FTD in transparent mode. A bridge group is set u...
- Q112. An engineer is monitoring network traffic from their sales and product development departm...
- Q113. An engineer has been tasked with providing disaster recovery for an organization's primary...
- Q114. An administrator is attempting to remotely log into a switch in the data centre using SSH ...
- Q115. An engineer is attempting to create a new dashboard within the Cisco FMC to have a single ...
- Q116. A network administrator reviews the file report for the last month and notices that all fi...
- Q117. An analyst is investigating a potentially compromised endpoint within the network and pull...
- Q118. Which command is entered in the Cisco FMC CLI to generate a troubleshooting file?...
- Q119. An engineer has been asked to show application usages automatically on a monthly basis and...
- Q120. What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment...
- Q121. An engineer configures an access control rule that deploys file policy configurations to s...
- Q122. Which limitation applies to Cisco FMC dashboards in a multi-domain environment?...
- Q123. What is the advantage of having Cisco Firepower devices send events to Cisco Threat Respon...
- Q124. Refer to the exhibit. (Exhibit) And engineer is analyzing the Attacks Risk Report and find...
- Q125. Which group within Cisco does the Threat Response team use for threat analysis and researc...
- Q126. An engineer must investigate a connectivity issue and decides to use the packet capture fe...
- Q127. An engineer has been tasked with providing disaster recovery for an organization's primary...
- Q128. Which command-line mode is supported from the Cisco Firepower Management Center CLI?...
- Q129. A network administrator notices that SI events are not being updated The Cisco FTD device ...
- Q130. A network engineer is extending a user segment through an FTD device for traffic inspectio...
- Q131. What is a feature of Cisco AMP private cloud?
- Q132. Drag and drop the steps to restore an automatic device registration failure on the standby...
- Q133. A Cisco FTD device is running in transparent firewall mode with a VTEP bridge group member...
- Q134. While integrating Cisco Umbrella with Cisco Threat Response, a network security engineer w...
- Q135. Drag and drop the steps to restore an automatic device registration failure on the standby...
- Q136. Which command must be run to generate troubleshooting files on an FTD?...
- Q137. A security engineer is configuring an Access Control Policy for multiple branch locations....
- Q138. In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot ...
- Q139. A network administrator is deploying a Cisco IPS appliance and needs it to operate initial...
- Q140. An analyst using the security analyst account permissions is trying to view the Correlatio...
- Q141. After deploying a network-monitoring tool to manage and monitor networking devices in your...
- Q142. Which policy rule is included in the deployment of a local DMZ during the initial deployme...
- Q143. A network administrator needs to create a policy on Cisco Firepower to fast-path traffic t...
- Q144. An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is ...
- Q145. An administrator is adding a QoS policy to a Cisco FTD deployment. When a new rule is adde...
- Q146. An organization has a Cisco IPS running in inline mode and is inspecting traffic for malic...
- Q147. Which protocol is needed to exchange threat details in rapid threat containment on Cisco F...
- Q148. Which two conditions are necessary for high availability to function between two Cisco FTD...
- Q149. What is a result of enabling Cisco FTD clustering?...
- Q150. When using Cisco Threat Response, which phase of the Intelligence Cycle publishes the resu...
- Q151. What is a valid Cisco AMP file disposition?
- Q152. A network administrator notices that SI events are not being updated The Cisco FTD device ...
- Q153. An administrator is working on a migration from Cisco ASA to the Cisco FTD appliance and n...
- Q154. Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain ...
- Q155. A network engineer implements a new Cisco Firepower device on the network to take advantag...
- Q156. Which license type is required on Cisco ISE to integrate with Cisco FMC pxGrid?...
- Q157. An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside in...
- Q158. Drag and drop the steps to restore an automatic device registration failure on the standby...
- Q159. With a recent summer time change, system logs are showing activity that occurred to be an ...
- Q160. An administrator is creating interface objects to better segment their network but is havi...
- Q161. A network administrator reviews the file report for the last month and notices that all fi...
- Q162. An engineer is troubleshooting application failures through an FTD deployment. While using...
- Q163. A mid-sized company is experiencing higher network bandwidth utilization due to a recent a...
- Q164. administrator is configuring SNORT inspection policies and is seeing failed deployment mes...
- Q165. A network administrator is configuring a site-to-site IPsec VPN to a router sitting behind...
- Q166. A network administrator is troubleshooting access to a website hosted behind a Cisco FTD d...
- Q167. An engineer is troubleshooting a device that cannot connect to a web server. The connectio...
- Q168. A Cisco FTD has two physical interfaces assigned to a BVI. Each interface is connected to ...
- Q169. An engineer is investigating connectivity problems on Cisco Firepower that is using servic...
- Q170. What are the minimum requirements to deploy a managed device inline?...
- Q171. With Cisco Firepower Threat Defense software, which interface mode must be configured to p...
- Q172. What are two application layer preprocessors? (Choose two.)...
