Which policy must you edit to make changes to the Snort preprocessors?
A.
access control policy
B.
network discovery policy
C.
intrusion policy
D.
file policy
E.
network analysis policy
Which policy must you edit to make changes to the Snort preprocessors?
Which policy must you edit to make changes to the Snort preprocessors?
A.
access control policy
B.
network discovery policy
C.
intrusion policy
D.
file policy
E.
network analysis policy
E. network analysis policy
C: intrusion policy
http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Tuning-Rules.pdf
An intrusion policy contains two types of rules: intrusion rules and preprocessor rules.
E. network analysis policy (version 5.4 or later. version 5.3 or earlier use intrusion policy)
http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/117927-technote-firesight-00.html
Passed today! Got a satisfying score! Come to share some questions with you and wish they are valid for you guys:
QUESTION
When deploying Cisco FirePOWER appliances, which option must you configure to enable VLAN rewriting?
A. hybrid interfaces
B. virtual switch
C. virtual router
D. inline set
Answer: B
QUESTION
Which policy must you edit to make changes to the Snort preprocessors?
A. access control policy
B. network discovery policy
C. intrusion policy
D. file policy
E. network analysis policy
Answer: A
QUESTION
Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)
A. pass
B. trust
C. monitor
D. allow
E. permit
F. inspect
Answer: BCD
QUESTION
Which two TCP ports can allow the Cisco Firepower Management Center to communication with FireAMP cloud for file disposition information? (Choose two.)
A. 8080
B. 22
C. 8305
D. 32137
E. 443
Answer: DE
QUESTION
When creating an SSL policy on Cisco FirePOWER, which three options do you have?
A. do not decrypt
B. trust
C. allow
D. block with reset
E. block
F. encrypt
Answer: ADE
QUESTION
Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)
A. Windows
B. AWS
C. Android
D. Cisco lOS
E. OSX
F. ChromeOS
Answer: ACE
QUESTION
Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?
A. explicit forward mode
B. Layer 4Traffic Monitor
C. transparent mode
D. Secure Web Proxy
Answer: B
QUESTION
Which feature requires the network discovery policy for it to work on the Cisco Next Generate fusion Prevent-on System?
A. impact flags
B. URL filtering
C. security intelligence
D. health monitoring
Answer: A
QUESTION
Which CLI command is used to register a Cisco FirePOWER sensor to Firepower Management Center?
A. configure system add
B. configure manager add host
C. configure manager delete
D. configure manger add
Answer: A
QUESTION
In WSA, which two pieces of information are required to implement transparent user identification using Context Directory Agent? (Choose two.)
A. the server name where Context Directory Agent is installed
B. the server name of the global catalog domain controller
C. the backup Context Directory Agent
D. the shared secret
E. the syslog server IP address
Answer: AE
More practice tests are necessary but new questions are also very important:https://www.braindump2go.com/300-210.html I studied this pdf and vce dumps and passed easily! You also can have a try!