1.
Which of the following would you most likely configure on a host to alert you about possible attacks without filtering traffic? (Select the best answer.)
2.
Which of the following forms of malware are typically standalone software that appear to be legitimate applications? (Select the best answer.)
3.
Which of the following lost or stolen device options are not available to employees when MDM is integrated with ISE? (Select 2 choices.)
4.
Which of the following private VLAN port types can communicate with promiscuous private VLAN ports but not with isolated private VLAN ports? (Select 2 choices.)
5.
On a Cisco ASA, which of the following authentication protocols is not supported by the TACACS+ server? (Select the best answer.)
6.
Which of the following are true of ARP traffic on a Cisco zonebased firewall in transparent mode? (Select 2 choices.)
7.
Which of the following statements about the test aaa group command is not true? (Select the best answer.)
8.
Which of the following tasks does CASE on an ESA not perform when detecting a possible threat? (Select the best answer.)
9.
You upload a file named isitbad.docx to AMP for analysis. While reviewing the AMP logs, you receive the following output:
Wed Feb 17 12:41:05 2015 Info: File reputation query initiating. File Name =
'isitbad.docx', MID = 856, File Size = 174401 bytes, File Type = application/msword
Wed Feb 17 12:41:10 2015 Info: Response received for file reputation query from Cache.
File Name = 'isitbad.docx', MID = 856, Disposition = file unknown, Malware = None, Reputation Score = 0, sha256 =
78d80f8fb0e6eaa2988d11607ec6a00840147f8188f6db8b7d00d907440d7aaa, upload_action = 1
Which of the following is true? (Select the best answer.)
10.
An inbound TCP SYN packet arrives at the ingress interface of a Cisco ASA 8.2 firewall. The packet is not part of an established session. The packet reaches the
interface's internal buffer and the input counter is incremented.
Which of the following actions will occur next? (Select the best answer.)