Q1. Refer to the exhibit.
When designing the network to redirect web traffic utilizing the Catalyst 6500 to the Cisco Web Security Appliance, impact on the switch platform needs consideration. Which four rows identify the switch behavior in correlation to the redirect method? (Choose four.)
A. Row 1
B. Row 2
C. Row 3
D. Row 4
E. Row 5
F. Row 6
G. Row 7
H. Row 8
Answer: B,C,F,G
Q2. What is a value that Cisco ESA can use for tracing mail flow?
A. the FQDN of the source IP address
B. the FQDN of the destination IP address
C. the destination IP address
D. the source IP address
Answer: A
Q3. What are the two policy types that can use a web reputation profile to perform reputation-based processing? (Choose two.)
A. profile policies
B. encryption policies
C. decryption policies
D. access policies
Answer: C,D
Q4. Which two conditions must you configure in an event action override to implement a risk rating of 70 or higher and terminate the connection on the IPS? (Choose two.)
A. Configure the event action override to send a TCP reset.
B. Set the risk rating range to 70 to 100.
C. Configure the event action override to send a block-connection request.
D. Set the risk rating range to 0 to 100.
E. Configure the event action override to send a block-host request.
Answer: A,B
Q5. During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map?
A. cxsc fail
B. cxsc fail-close
C. cxsc fail-open
D. cxssp fail-close
Answer: B
Q6. Refer to the exhibit.
What Cisco ESA CLI command generated the output?
A. smtproutes
B. tophosts C. hoststatus
D. workqueuestatus
Answer: B
Q7. To what extent will the Cisco IPS sensor contribute data to the Cisco SensorBase network?
A. It will not contribute to the SensorBase network.
B. It will contribute to the SensorBase network, but will withhold some sensitive information
C. It will contribute the victim IP address and port to the SensorBase network.
D. It will not contribute to Risk Rating adjustments that use information from the SensorBase network.
Answer: B
Explanation:
To configure network participation, follow these steps:.Step 1.Log in to IDM using an account with administrator privileges..Step 2.Choose Configuration > Policies > Global Correlation > Network Participation..Step 3.To turn on network participation, click the Partial or Full radio button:..Partial—Data is contributed to the SensorBase Network, but data considered potentially sensitive is filtered out and never sent...Full—All data is contributed to the SensorBase Network
In this case, we can see that this has been turned off as shown below:
Q8. A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature?
A. Show statistics virtual-sensor
B. Show event alert
C. Show alert
D. Show version
Answer: A
Q9. Which three statements about Cisco CWS are true? (Choose three.)
A. It provides protection against zero-day threats.
B. Cisco SIO provides it with threat updates in near real time.
C. It supports granular application policies.
D. Its Roaming User Protection feature protects the VPN from malware and data breaches.
E. It supports local content caching.
F. Its Cognitive Threat Analytics feature uses cloud-based analysis and detection to block threats outside the network.
Answer: A,B,C
Q10. Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.)
A. SMTP
B. HTTP
C. DNS
D. SNMP
E. FTP
Answer: A,B,C
Q11. Which three zones are used for anomaly detection in a Cisco IPS? (Choose three.)
A. internal zone
B. external zone
C. illegal zone
D. inside zone
E. outside zone
F. DMZ zone
Answer: A,B,C
Q12. Who or what calculates the signature fidelity rating?
A. the signature author
B. Cisco Professional Services
C. the administrator
D. the security policy
Answer: A
Q13. Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email?
A. SBA
B. secure mobile access
C. IPv6 DMZ web service
D. ESA
Answer: D
Q14. Which three search parameters are supported by the Email Security Monitor? (Choose three.)
A. Destination domain
B. Network owner
C. MAC address
D. Policy requirements
E. Internal sender IP address
F. Originating domain
Answer: A,B,E
Q15. Which two benefits are provided by the dynamic dashboard in Cisco ASDM Version 5.2? (Choose two.)
A. It configures system polices for NAC devices.
B. It forwards traffic to destination devices.
C. It provides statistics for device health.
D. It replaces syslog, RADIUS, and TACACS+ servers.
E. It automatically detects Cisco security appliances to configure.
Answer: C,E
Q16. Which Cisco Security IntelliShield Alert Manager Service component mitigates new botnet, phishing, and web-based threats?
A. the IntelliShield Threat Outbreak Alert
B. IntelliShield Alert Manager vulnerability alerts
C. the IntelliShield Alert Manager historical database
D. the IntelliShield Alert Manager web portal
E. the IntelliShield Alert Manager back-end intelligence engine
Answer: A