Question 126

Which group within Cisco does the Threat Response team use for threat analysis and research?
  • Question 127

    A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?
  • Question 128

    Which action should be taken after editing an object that is used inside an access control policy?
  • Question 129

    Which two considerations must be made when deleting and re-adding devices while managing them via Cisco FMC? (Choose two.)
  • Question 130

    In which two places can thresholding settings be configured? (Choose two.)