Pass the Cisco Systems Engineer 500-651 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which license subscription terms are available for AMP licensing?

Options:

A.

1 month, 3 months, 6 months


B.

1 year, 5 years, 10 years


C.

5 years, 10 years, 30 years


D.

1 year, 3 years, 5 years


Expert Solution
Questions # 22:

Which are two main features of DDoS Attack Prevention? (Choose two.)

Options:

A.

Block or allow traffic automatically


B.

Redirects DDoS traffic back to attacker


C.

Leveraging AMP ThreatGrid technology


D.

Stop attacks within seconds of detection


Expert Solution
Questions # 23:

Which feature of AMP tracks the movement of a file within the environment and monitors its disposition over time?

Options:

A.

Trajectory


B.

Fuzzy Fingerprinting


C.

Machine Learning


D.

ThreatGrid


Expert Solution
Questions # 24:

How does AMP’s device trajectory capabilities help address customer ’s issues?

Options:

A.

It determines the scope and cause of an outbreak and tracks suspicious files


B.

It searches for potential threats based on identified activities and behaviors


C.

It isolates suspicious files and runs them in a sa ndbox environment to determine their authenticity


D.

It analyses the data from suspicious files to provide a new level of threat intelligence


Expert Solution
Questions # 25:

Which Cisco Product is integrated with the AnyConnect Web Security Module?

Options:

A.

Cisco Stealthwatch


B.

Cisco Defense Orchestrator


C.

Cisco Cloud Web Security


D.

Cisco Email Security Appliance


Expert Solution
Questions # 26:

Which is a key feature of Cisco Defense Orchestrator?

Options:

A.

Simplifies security policy management


B.

Identifies sensitive data in cloud environments


C.

Detects anomalous traffic on customer ’s network


D.

Provides retrospective security


Expert Solution
Questions # 27:

Which StealthWatch device monitors, analyzes, separates, categorizes, and stores information from, allowing it to create a baseline of type expected network activity?

Options:

A.

Forensic investigation


B.

Advanced malware protection


C.

Malware clustering


D.

Flow collector


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions