We are committed on providing you with the latest and most Cisco 500-275 exam preparation products.If you want to pass Cisco 500-275 exam successfully, do not miss to read latest Cisco 500-275 on Flydumps.
The FireAMP Mobile endpoint connector currently supports which mobile OS device?
Correct Answer: C QUESTION 2
Which statement describes an advantage of the FireAMP product?
A. Signatures are pushed to endpoints more quickly than other antivirus products.
B. Superior detection algorithms on the endpoint limit the amount of work the cloud must perform.
C. It provides enterprise visibility.
D. It relies on sandboxing.
Correct Answer: C QUESTION 3
Which feature allows retrospective detection?
A. Total Recall
B. Cloud Recall
C. Recall Alert
D. Recall Analysis
Correct Answer: B QUESTION 4
Which statement describes an advantage of cloud-based detection?
A. Limited customization allows for faster detection.
B. Fewer resources are required on the endpoint.
C. Sandboxing reduces the overall management overhead of the system.
D. High-speed analytical engines on the endpoint limit the amount of work the cloud must perform.
Correct Answer: B QUESTION 5
The FireAMP connector monitors the system for which type of activity?
B. Enforcement of usage policies
C. File operations
D. Authentication activity
Correct Answer: C QUESTION 6
Which disposition can be returned in response to a malware cloud lookup?
Correct Answer: C QUESTION 7
Which option is a detection technology that is used by FireAMP?
A. fuzzy matching
B. Norton AntiVirus
C. network scans
Correct Answer: A QUESTION 8
If a file’s SHA-256 hash is sent to the cloud, but the cloud has never seen the hash before, which disposition is returned?
Correct Answer: B QUESTION 9
File information is sent to the Sourcefire Collective Security Intelligence Cloud using which format?
D. SHA-256 Correct Answer: D
Question Set 1 QUESTION 1
How does application blocking enhance security?
A. It identifies and logs usage.
B. It tracks application abuse.
C. It deletes identified applications.
D. It blocks vulnerable applications from running, until they are patched.
Correct Answer: D QUESTION 2
Which set of actions would you take to create a simple custom detection?
A. Add a SHA-256 value; upload a file to calculate a SHA-256 value; upload a text file that contains SHA-256 values.
B. Upload a packet capture; use a Snort rule; use a ClamAV rule.
C. Manually input the PE header data, the MD-5 hash, and a list of MD-5 hashes.
D. Input the file and file name.
Correct Answer: A QUESTION 3
Advanced custom signatures are written using which type of syntax?
A. Snort signatures
B. Firewall signatures
C. ClamAV signatures
D. bash shell
Correct Answer: C QUESTION 4
When discussing the FireAMP product, which term does the acronym DFC represent?
A. It means Detected Forensic Cause.
B. It means Duplicate File Contents.
C. It means Device Flow Correlation.
D. It is not an acronym that is associated with the FireAMP product.
Correct Answer: C QUESTION 5
Custom whitelists are used for which purpose?
A. to specify which files to alert on
B. to specify which files to delete
C. to specify which files to ignore
D. to specify which files to sandbox Correct Answer: C
Flydumps Cisco 500-275 exam dumps are audited by our certified subject matter experts and published authors for development. Flydumps Cisco 500-275 exam dumps are one of the highest quality Cisco 500-275 Q&As in the world. It covers nearly 96% real questions and answers, including the entire testing scope. Flydumps guarantees you pass Cisco 500-275 exam at first attempt.