Question 126
Which group within Cisco does the Threat Response team use for threat analysis and research?
Question 127
A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?
Question 128
Which action should be taken after editing an object that is used inside an access control policy?
Question 129
Which two considerations must be made when deleting and re-adding devices while managing them via Cisco FMC? (Choose two.)
Question 130
In which two places can thresholding settings be configured? (Choose two.)