Which cloud-based malware detection engine uses machine…
Which cloud-based malware detection engine uses machine-learning detection techniques
in the Cisco
Advanced Malware Protection cloud?
which two places can thresholding settings be configured?
In which two places can thresholding settings be configured? (Choose two.)
Which tool on the Cisco Email Security gateway can you …
A system administrator wants to know if the email traffic from a remote partner will
active special treatment message filters that are created just for them . Which tool on the
Cisco Email Security gateway can you use to debug and emulate the flow that a message
takes through the work queue?
Which two appliances support logical routed interfaces?
Which two appliances support logical routed interfaces? (Choose two.)
Which object can be used on a Cisco FirePOWER appliance…
Which object can be used on a Cisco FirePOWER appliance, but not in an access control
policy rule on Cisco FirePOWER services running on a Cisco ASA?
which two event actions can be configured on a rule?
In a Cisco FirePOWER instrusion policy, which two event actions can be configured on a
rule? (Choose two.)
how is traffic directed form based Cisco ASA to the Cis…
When using Cisco FirePOWFR Services for ASA, how is traffic directed form based
Cisco ASA to the Cisco POWER Services?
where is the request logged?
When the WSA policy trace tool is used to make a request to the proxy, where is the
request logged?
which option shows a list of all files that have been e…
With Cisco AMP for Endpoints, which option shows a list of all files that have been
executed in your environment?
How does the WSA policy trace tool make a request to th…
How does the WSA policy trace tool make a request to the Proxy to emulate a client
request?