Name: Implementing Cisco Threat Control Solutions (SITCS)
File format: PDF
During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using
which command in a policy-map?
A. cxsc fail
B. cxsc fail-close
C. cxsc fail-open
D. cxssp fail-close
Correct Answer: B
What Event Action in an IPS signature is used to stop an attacker from communicating with a network using an
A. Request Block Host
B. Deny Attacker Inline
C. Deny Connection Inline
D. Deny Packet Inline
E. Request Block Connection
Correct Answer: A
When a Cisco Email Security Appliance joins a cluster, which four settings are inherited? (Choose four.)
A. IP address
B. DNS settings
C. SMTP routes
Correct Answer: BCDE
Which option describes a customer benefit of the Cisco Security IntelliShield Alert Manager?
A. It provides access to threat and vulnerability information for Cisco related products only.
B. It consolidates vulnerability information from an internal Cisco source, which allows security personnel to
focus on remediation and proactive protection versus research.
C. It provides effective and timely security intelligence via early warnings about new threats and technology
D. It enhances the efficiency of security staff with accurate, noncustomizable threat intelligence, critical
remediation information, and easy-to-use workflow tools.
Correct Answer: C