Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 500-275 - Securing Cisco Networks with Sourcefire FireAMP Endpoints

Page: 2 / 2
Total 50 questions

Which option represents a configuration step on first use?

A.

Verify, Contain, and Protect

B.

User Account Setup

C.

System Defaults Configuration

D.

Event Filtering

Which option describes a requirement for using Remote File Fetch?

A.

It must be done from a private cloud console.

B.

It can be done only over port 32137.

C.

The administrator must have two-step authentication enabled.

D.

The feature is integrated into the product, so no specific requirements must be fulfilled.

Advanced custom signatures are written using which type of syntax?

A.

Snort signatures

B.

Firewall signatures

C.

ClamAV signatures

D.

bash shell

How does application blocking enhance security?

A.

It identifies and logs usage.

B.

It tracks application abuse.

C.

It deletes identified applications.

D.

It blocks vulnerable applications from running, until they are patched.

What is a valid data source for DFC Windows connector policy configuration?

A.

SANS

B.

NIST

C.

Emerging Threats

D.

Custom and Sourcefire