Exam 23: Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the result a specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

(Multiple Choice)
4.8/5
(47)

What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

(Multiple Choice)
4.8/5
(36)

What is a result of enabling Cisco FTD clustering?

(Multiple Choice)
5.0/5
(39)

Which CLI command is used to control special handling of ClientHello messages?

(Multiple Choice)
4.8/5
(38)

Network traffic coming from an organization's CEO must never be denied. Which access control policy configuration option should be used if the deployment engineer is not permitted to create a rule to allow all traffic?

(Multiple Choice)
4.9/5
(27)

What is a characteristic of bridge groups on a Cisco FTD?

(Multiple Choice)
4.7/5
(42)

With Cisco FTD software, which interface mode must be configured to passively receive traffic that passes through the appliance?

(Multiple Choice)
4.8/5
(37)

An engineer is monitoring network traffic from their sales and product development departments, which are on two separate networks. What must be configured in order to maintain data privacy for both departments?

(Multiple Choice)
4.9/5
(32)

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?

(Multiple Choice)
4.7/5
(41)

An administrator is setting up Cisco FirePower to send data to the Cisco Stealthwatch appliances. The NetFlow_Set_Parameters objet is already created, but NetFlow is not being sent to the flow collector. What must be done to prevent this from occurring?

(Multiple Choice)
4.7/5
(28)

Which action should be taken after editing an object that is used inside an access control policy?

(Multiple Choice)
4.7/5
(41)

In which two places are thresholding settings configured? (Choose two.)

(Multiple Choice)
4.9/5
(40)

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

(Multiple Choice)
4.9/5
(41)

What are two features of bridge-group interfaces in Cisco FTD? (Choose two.)

(Multiple Choice)
4.9/5
(38)

In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached?

(Multiple Choice)
4.9/5
(30)

Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

(Multiple Choice)
4.8/5
(36)

Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment?

(Multiple Choice)
5.0/5
(36)

A VPN user is unable to connect to web resources behind the Cisco FTD device terminating the connection. While troubleshooting, the network administrator determines that the DNS responses are not getting through the Cisco FTD. What must be done to address this issue while still utilizing Snort IPS rules?

(Multiple Choice)
4.9/5
(27)

What is the maximum SHA level of filtering that Threat Intelligence Director supports?

(Multiple Choice)
4.7/5
(43)

On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?

(Multiple Choice)
5.0/5
(35)
Showing 41 - 60 of 130
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)