Question 106
Which group within Cisco does the Threat Response team use for threat analysis and research?
Question 107
Which object type supports object overrides?
Question 108
Upon detecting a flagrant threat on an endpoint, which two technologies instruct Cisco Identity Services Engine to contain the infected endpoint either manually or automatically? (Choose two.)
Question 109
A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?
Question 110
How many report templates does the Cisco Firepower Management Center support?