Which of the following would you most likely configure on a host to alert you about possible attacks without filtering traffic? (Select the best answer.)
Which of the following private VLAN port types can communicate with promiscuous private VLAN ports but not with isolated private VLAN ports? (Select 2 choices.)
You upload a file named isitbad.docx to AMP for analysis. While reviewing the AMP logs, you receive the following output:
Wed Feb 17 12:41:05 2015 Info: File reputation query initiating. File Name =
'isitbad.docx', MID = 856, File Size = 174401 bytes, File Type = application/msword
Wed Feb 17 12:41:10 2015 Info: Response received for file reputation query from Cache.
File Name = 'isitbad.docx', MID = 856, Disposition = file unknown, Malware = None, Reputation Score = 0, sha256 =
78d80f8fb0e6eaa2988d11607ec6a00840147f8188f6db8b7d00d907440d7aaa, upload_action = 1
Which of the following is true? (Select the best answer.)
An inbound TCP SYN packet arrives at the ingress interface of a Cisco ASA 8.2 firewall. The packet is not part of an established session. The packet reaches the
interface's internal buffer and the input counter is incremented.
Which of the following actions will occur next? (Select the best answer.)