With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?
An engineer is configuring a Cisco IPS to protect the network and wants to test a policy before deploying it. A copy of each incoming packet needs to be monitored while traffic flow remains constant. Which IPS mode should be implemented to meet these requirements?
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?
Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment?
Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose two.)
What is the maximum SHA level of filtering that Threat Intelligence Director supports?
What is a valid Cisco AMP file disposition?
In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached?