Download Securing Cisco Networks with Sourcefire FireAMP Endpoints.500-275.TestInside.2019-02-28.50q.vcex

Vendor: Cisco
Exam Code: 500-275
Exam Name: Securing Cisco Networks with Sourcefire FireAMP Endpoints
Date: Feb 28, 2019
File Size: 22 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
The FireAMP Mobile endpoint connector currently supports which mobile OS device?
  1. Firefox
  2. HTML5
  3. Android
  4. iPhone
Correct answer: C
Question 2
Which statement describes an advantage of the FireAMP product?
  1. Signatures are pushed to endpoints more quickly than other antivirus products.
  2. Superior detection algorithms on the endpoint limit the amount of work the cloud must perform.
  3. It provides enterprise visibility.
  4. It relies on sandboxing.
Correct answer: C
Question 3
Which feature allows retrospective detection?
  1. Total Recall
  2. Cloud Recall
  3. Recall Alert
  4. Recall Analysis
Correct answer: B
Question 4
Which statement describes an advantage of cloud-based detection?
  1. Limited customization allows for faster detection.
  2. Fewer resources are required on the endpoint.
  3. Sandboxing reduces the overall management overhead of the system.
  4. High-speed analytical engines on the endpoint limit the amount of work the cloud must perform.
Correct answer: B
Question 5
The FireAMP connector monitors the system for which type of activity?
  1. Vulnerabilities
  2. Enforcement of usage policies
  3. File operations
  4. Authentication activity
Correct answer: C
Question 6
Which disposition can be returned in response to a malware cloud lookup?
  1. Dirty
  2. Virus
  3. Malware
  4. Infected
Correct answer: C
Question 7
Which option is a detection technology that is used by FireAMP?
  1. fuzzy matching
  2. Norton AntiVirus
  3. network scans
  4. Exterminator
Correct answer: A
Question 8
If a file's SHA-256 hash is sent to the cloud, but the cloud has never seen the hash before, which disposition is returned?
  1. Clean
  2. Neutral
  3. Malware
  4. Unavailable
Correct answer: B
Question 9
File information is sent to the Sourcefire Collective Security Intelligence Cloud using which format?
  1. MD5
  2. SHA-1
  3. filenames
  4. SHA-256
Correct answer: D
Question 10
How does application blocking enhance security?
  1. It identifies and logs usage.
  2. It tracks application abuse.
  3. It deletes identified applications.
  4. It blocks vulnerable applications from running, until they are patched.
Correct answer: D
Question 11
The FireAMP Mobile endpoint connector currently supports which mobile OS device?
  1. Firefox
  2. HTML5
  3. Android
  4. iPhone
Correct answer: C
Question 12
Which statement describes an advantage of the FireAMP product?
  1. Signatures are pushed to endpoints more quickly than other antivirus products.
  2. Superior detection algorithms on the endpoint limit the amount of work the cloud must perform.
  3. It provides enterprise visibility.
  4. It relies on sandboxing.
Correct answer: C
Question 13
Which feature allows retrospective detection?
  1. Total Recall
  2. Cloud Recall
  3. Recall Alert
  4. Recall Analysis
Correct answer: B
Question 14
Which statement describes an advantage of cloud-based detection?
  1. Limited customization allows for faster detection.
  2. Fewer resources are required on the endpoint.
  3. Sandboxing reduces the overall management overhead of the system.
  4. High-speed analytical engines on the endpoint limit the amount of work the cloud must perform.
Correct answer: B
Question 15
The FireAMP connector monitors the system for which type of activity?
  1. Vulnerabilities
  2. Enforcement of usage policies
  3. File operations
  4. Authentication activity
Correct answer: C
Question 16
Which disposition can be returned in response to a malware cloud lookup?
  1. Dirty
  2. Virus
  3. Malware
  4. Infected
Correct answer: C
Question 17
Which option is a detection technology that is used by FireAMP?
  1. fuzzy matching
  2. Norton AntiVirus
  3. network scans
  4. Exterminator
Correct answer: A
Question 18
If a file's SHA-256 hash is sent to the cloud, but the cloud has never seen the hash before, which disposition is returned?
  1. Clean
  2. Neutral
  3. Malware
  4. Unavailable
Correct answer: B
Question 19
File information is sent to the Sourcefire Collective Security Intelligence Cloud using which format?
  1. MD5
  2. SHA-1
  3. filenames
  4. SHA-256
Correct answer: D
Question 20
How does application blocking enhance security?
  1. It identifies and logs usage.
  2. It tracks application abuse.
  3. It deletes identified applications.
  4. It blocks vulnerable applications from running, until they are patched.
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!