EnsurepassQUESTION 151 Which two statements about Cisco ESA clusters are true? (Choose two.)   A. A cluster must contain exactly one group. B. A cluster can contain multiple groups. C. Clusters are implemented in a client/server relationship. D. The cluster configuration must be managed by the cluster administrator. E. The cluster configuration can be created and managed through either the GUI or the CLI.   Correct Answer: BE     QUESTION 152 Which two statements Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 71  To what extent will the Cisco IPS sensor contribute data to the Cisco SensorBase network?   A. It will not contribute to the SensorBase network. B. It will contribute to the SensorBase network, but will withhold some sensitive information C. It will contribute the victim IP address and port to the SensorBase network. D. It will not contribute to Risk Rating adjustments that use information Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 141 Which centralized reporting function of the Cisco Content Security Management Appliance aggregates data from multiple Cisco ESA devices?   A. message tracking B. web tracking C. system tracking D. logging   Correct Answer: A     QUESTION 142 What is a value that Cisco ESA can use for tracing mail flow?   A. the FQDN of the source IP address B. the FQDN of the destination Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 131 What can you use to access the Cisco IPS secure command and control channel to make configuration changes?   A. SDEE B. the management interface C. an HTTP server D. Telnet   Correct Answer: B     QUESTION 132 Which Cisco te chnology provides spam filtering and email protection?   A. IPS B. ESA C. WSA D. CX   Correct Answer: B     QUESTION 133 You ran Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 121 Which method does Cisco recommend for collecting streams of data on a sensor that has been virtualized?   A. VACL capture B. SPAN C. the Wireshark utility D. packet capture   Correct Answer: D     QUESTION 122 Which configur ation mode enables a virtual sensor to monitor the session state for unidirectional traffic?   A. asymmetric mode B. symmetric mode C. loose mode Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 111 Which two statements regarding the basic setup of the Cisco CX for services are correct? (Choose two.)   A. The Packet capture feature is available for either permitted or dropped packets by default. B. Public Certificates can be used for HTTPS Decryption policies. C. Public Certificates cannot be used for HTTPS Decryption policies. D. When adding a standard LDAP realm, the group attribute will be Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 101 A system administrator wants to know if the email traffic from a remote partner will activate special treatment message filters that are created just for them. Which tool on the Cisco Email Security gateway can you use to debug or emulate the flow that a message takes through the work queue?   A. the message tracker interface B. centralized or local message tracking C. the CLI findevent command D. Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 91 What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS sessions and HTTPS access?   A. sslconfig B. sslciphers C. tlsconifg D. certconfig   Correct Answer: A     QUESTION 92 Joe was asked to se cure access to the Cisco Web Security Appliance to prevent unauthorized access. Which four steps should Joe implement to accomplish this goal? (Choose four.)   Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 81 What Event Action in an IPS signature is used to stop an attacker from communicating with a network using an access-list?   A. Request Block Host B. Deny Attacker Inline C. Deny Connection Inline D. Deny Packet Inline E. Request Block Connection   Correct Answer: A     QUESTION 82 Within Cisco IPS anomaly detection, what is the default IP range of the external zone?   A. Read more [...]
EnsurepassImplementing Cisco Threat Control Solutions (SITCS)   QUESTION 61 The Web Security Appliance has identities defined for faculty and staff, students, and default access. The faculty and staff identity identifies users based on the source network and authenticated credentials. The identity for students identifies users based on the source network along with successful authentication credentials. The global identity is for guest users not authenticated against the domain. Recently, a Read more [...]