Question 131
Which action should be taken after editing an object that is used inside an access control policy?
Question 132
In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)
Question 133
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)
Question 134
Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)
Question 135
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?