Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 500-275 - Securing Cisco Networks with Sourcefire FireAMP Endpoints

Page: 1 / 2
Total 50 questions

When a user initiates a scan, which types of scan are available as options?

A.

scheduled scan, thorough scan, quick scan, network scan

B.

jiffy scan, overnight scan, scan when available, vulnerability scan

C.

flash scan, custom scan, full scan

D.

none, because user-initiated scans are not allowed

Which pair represents equivalent processes whose names differ, depending on the connector version that you are running?

A.

immunet_protect and iptray

B.

agent.exe and sfc.exe

C.

TETRA and SPERO

D.

ETHOS and SPERO

Which of these can you use for two-step authentication?

A.

the Apple Authenticator app

B.

the Google Authenticator app

C.

a SecurID token

D.

any RFC 1918 compatible application

The Accounts menu contains items that are related to FireAMP console accounts. Which menu allows you to set the default group policy?

A.

Audit Log

B.

Users

C.

Applications

D.

Business

From the Deployment screen, you can deploy agents via which mechanism?

A.

push to client

B.

.zip install file

C.

user download from Sourcefire website or email

D.

precompiled RPM package

Which statement represents a best practice for deploying on Windows servers?

A.

You should treat Windows servers like any other host in the deployment.

B.

You should obtain the Microsoft TechNet article that describes the proper exclusions for Windows servers.

C.

You should never configure exclusions for Windows servers.

D.

You should deploy FireAMP connectors only alongside existing antivirus software on Windows servers.

The FireAMP Mobile endpoint connector currently supports which mobile OS device?

A.

Firefox

B.

HTML5

C.

Android

D.

iPhone

File information is sent to the Sourcefire Collective Security Intelligence Cloud using which format?

A.

MD5

B.

SHA-1

C.

filenames

D.

SHA-256

What is the first system that is infected with a particular malware called?

A.

Patient Zero

B.

Source

C.

Infector

D.

Carrier

How many days' worth of data do the widgets on the dashboard page display?

A.

the previous 5 days of data

B.

the previous 6 days of data

C.

the previous 7 days of data

D.

the number of days you set in the dashboard configuration