What is the maximum SHA level of filtering that Threat Intelligence Director supports?
What is the maximum SHA level of filtering that Threat Intelligence Director supports? A. SHA-1024 B. SHA-4096 C. SHA-512 D. SHA-256
What is the maximum SHA level of filtering that Threat Intelligence Director supports? A. SHA-1024 B. SHA-4096 C. SHA-512 D. SHA-256
Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment? A. pxGrid B. FTD RTC C. FMC RTC D. ISEGrid
Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose two.) A. dynamic null route configured B. DHCP pool disablement C. quarantine D. port shutdown E. host shutdown
In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached? A. unavailable B. unknown C. clean D. disconnected
What is a valid Cisco AMP file disposition? A. non-malicious B. malware C. known-good D. pristine
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively? A. Windows domain controller B. audit C. triage D. protection
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware? A. Add the malicious file to the block list. B. Send a snapshot to Cisco for technical support. C. Forward the…
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.) A. application blocking B. simple custom detection C. file repository D. exclusions E. application whitelisting
Which two packet captures does the FTD LINA engine support? (Choose two.) A. Layer 7 network ID B. source IP C. application ID D. dynamic firewall importing E. protocol
What is a behavior of a Cisco FMC database purge? A. User login and history data are removed from the database if the User Activity check box is selected. B. Data can be recovered from the device. C. The appropriate…