[Free] 2017(Aug) CollectDumps Passguide Cisco 500-260 Dumps with VCE and PDF 21-30

CollectDumps 2017 Aug Cisco Official New Released 500-260
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/500-260.html

Cisco ASA Express Security (SAEXS)

Question No: 21

Which application is required to enable Microsoft Active Directory identity integration for

FirePOWER services?

  1. Sourcefire User Agent

  2. Microsoft Active Directory Manager

  3. Cisco Directory Agent

  4. Microsoft Active Directory Agent

Answer: A

Question No: 22

Which access policy action should be applied if traffic is to pass without applying any additional inspection?

  1. trust

  2. allow

  3. permit

  4. monitor

Answer: A

Question No: 23

Refer to the exhibit.

Collectdumps 2017 PDF and VCE

A NOC engineer needs to tune some postlogin parameters on an SSL VPN tunnel. From the information shown, where should the engineer navigate to, in order to find all the

postlogin session parameters?

  1. quot;engineeringquot; Group Policy

  2. quot;contractorquot; Connection Profile

  3. DefaultWEBVPNGroup Group Policy

  4. DefaultRAGroup Group Policy

  5. quot;engineer1quot; AAA/Local Users

Answer: A

Question No: 24

Refer to the exhibit.

Collectdumps 2017 PDF and VCE

Which traffic is permitted on the inside interface without any interface ACLs configured?

  1. any IP traffic input to the inside interface

  2. any IP traffic input to the inside interface destined to any lower security level interfaces

  3. only HTTP traffic input to the inside interface

  4. only HTTP traffic output from the inside interface

  5. No input traffic is permitted on the inside interface

  6. No output traffic is permitted on the inside interface

Answer: C

Question No: 25

When the Cisco ASA appliance is processing packets, which action is performed first?

  1. Check if the packet is permitted or denied by the inbound interface ACL.

  2. Check if the packet is permitted or denied by the outbound interface ACL.

  3. Check if the packet is permitted or denied by the global ACL.

  4. Check if the packet matches an existing connection in the connection table.

  5. Check if the packet matches an inspection policy.

  6. Check if the packet matches a NAT rule.

Answer: D

Question No: 26

A security administrator suspects that an internal system has been infected by malware and communicates with an external server.

Which Cisco ASA NGFW license must the administrator have to detect and monitor the unauthorized command and control network traffic?

  1. AVC

  2. WSE

  3. CWS

  4. Botnet traffic

Answer: D

Question No: 27

What are two benefits that are provided by file trajectory services? (Choose two.)

  1. identifies malware point of entry

  2. highlights attack-propagation paths

  3. provides endpoint operating system patches

  4. publishes malware gateways on a blacklist

  5. pushes personal firewall updates to endpoints

Answer: A,B

Question No: 28

Which port should be allowed to support communications between Sourcefire User Agent and FireSIGHT Management Center?

  1. TCP/3306

  2. TCP/3389

  3. UDP/3389

  4. TCP/443

Answer: A

Question No: 29

Which threat score rating is the default value that identifies malware?

  1. greater than or equal to 80

  2. greater than or equal to 76

  3. greater than or equal to 75

  4. greater than or equal to 85

Answer: B

Question No: 30

Which statement describes what happens during a file-disposition check for malware?

  1. The managed device extracts the pieces of file from the data stream, calculates a hash on each piece, and forwards each piece to the cloud for checking. If all pieces are clean, the original file is forwarded to the destination.

  2. The managed device extracts all pieces of a file before calculating a hash on the complete file. Each piece is forwarded to the destination with the final piece being released if the entire file is deemed clean.

  3. The managed device extracts all pieces of a file before calculating a hash on the complete file. If the entire file is deemed clean, it is forwarded to the destination.

  4. The managed device extracts the pieces of file from the data stream, calculates a hash on each piece, and forwards each piece to the cloud for checking. All pieces are also forwarded to the destination with the last piece being forwarded if it is deemed clean.

Answer: B

100% Free Download!
Download Free Demo:500-260 Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps 500-260 Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE