Question 131

Which action should be taken after editing an object that is used inside an access control policy?
  • Question 132

    In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)
  • Question 133

    Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)
  • Question 134

    Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)
  • Question 135

    Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?