What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration? A. No traffic is redirected. B. Only traffic from the inside network is redirected. C. Only TCP traffic is redirected. D. All traffic is redirected.
Refer to the exhibit. What is a result of the configuration? A. No traffic is redirected. B. Only traffic from the inside network is redirected. C. Only TCP traffic is redirected. D. All traffic is redirected.
What is a feature of Cisco Hybrid Email Security? A. application visibility and control B. roaming user protection C. Cisco Registered Envelope Service D. Layer 4 traffic monitoring
Which redundancy protocol is available for Cisco Firepower but is a limitation for the WSA? A. SFRP B. HSRP C. VVRP D. GLBP
Which two Snort actions are available by default when creating Snort rules, regardless of deployment mode? (Choose two.) A. reject B. sdrop C. activate D. drop E. pass
A web security appliance is inspecting inbound traffic. In which sequence is inbound https traffic inspected? A. Decryption Policy > Access Policy > Routing Policy B. Access Policy > Decryption Policy > Routing Policy C. Access Policy > Routing Policy…
What is omitted from a query on a Cisco ESA virtual appliance? A. FailoverHealthy B. CPUUtilizationExceeded C. keyExpiration D. raidTable
A network engineer must generate troubleshooting files on a Cisco Firepower NGIPSv device. Which command does the network engineer run? A. sudo sf_troubleshoot.pl B. system generate-troubleshoot all C. show tech-support D. tech-support details
A university policy has to allow open access to resources on the Internet for research, but internal workstations have been exposed to malware. Which AMP feature allows the engineering team to determine whether a file is installed on a selected…
Which description of a correlation policy configuration in the Cisco Firepower Management Center is true? A. You cannot add a host profile qualification to a correlation rule that is triggered by a malware event. B. Deleting a response group deletes…
Which two actions can be used in an access control policy rule? (Choose two.) A. Block ALL B. Discover C. Monitor D. Trust Rule E. Block with Reset