Question 111

The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on the network are running the executable file. What must be configured within Cisco AMP for Endpoints to show this data?
  • Question 112

    Which two actions can be used in an access control policy rule? (Choose two.)
  • Question 113

    An organization is setting up two new Cisco FTD devices to replace their current firewalls and cannot have any network downtime During the setup process, the synchronization between the two devices is failing What action is needed to resolve this issue?
  • Question 114

    Which two actions can be used in an access control policy rule? (Choose two.)
  • Question 115

    Refer to the exhibit.

    An organization has an access control rule with the intention of sending all social media traffic for inspection After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed What must be done to address this issue?