how is traffic directed form based Cisco ASA to the Cis…
When using Cisco FirePOWFR Services for ASA, how is traffic directed form based
Cisco ASA to the Cisco POWER Services?
where is the request logged?
When the WSA policy trace tool is used to make a request to the proxy, where is the
request logged?
which option shows a list of all files that have been e…
With Cisco AMP for Endpoints, which option shows a list of all files that have been
executed in your environment?
How does the WSA policy trace tool make a request to th…
How does the WSA policy trace tool make a request to the Proxy to emulate a client
request?
which interface mode do you configurefor an IPS deploym…
With Cisco FirePOWER Threat Defense software, which interface mode do you configurefor an IPS deployment, where traffic passes through the appliance but does not require
VLAN rewriting?
Which Cisco ESA predefined sender group uses parameter-…
Which Cisco ESA predefined sender group uses parameter-matching to reject senders?
Which protocols can be specified in a Snort rule header…
Which protocols can be specified in a Snort rule header for analysis?
what are two items you can disable to enhance performance?
When you configure the Cisco ESA to perform blacklisting, what are two items you can
disable to enhance performance? (Choose two.)
Which type of policy is used to define the scope for ap…
Which type of policy is used to define the scope for applications that are running on hosts?
What are two requirements for configuring a hybrid inte…
What are two requirements for configuring a hybrid interface in FirePOWER? (Choose
two)