Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Quiz Questions and Answers

Variables are used in multiple locations in Cisco Firepower NGIPS. IPS rules use pre-configured variables representing networks and ports. Which of the following are system default variables that are preconfigured in Cisco Firepower devices?

Answer :
  • All of the above

You are tasked to deploy an intrusion policy designed to balance overall network performance with network infrastructure security. Which of the following base policies would you deploy in situations where you want to apply intrusion prevention?

Answer :
  • Balanced Security and Connectivity

You are tasked to configure NAT and translate the source address of an object regardless of the destination address. Which of the following NAT configuration features would you deploy to accomplish this task?

Answer :
  • Auto NAT

Cisco ASA provides the Modular Policy Framework (MPF) to provide application security or perform Quality of Service (QoS) functions. The MPF offers a consistent and flexible way to configure the Cisco ASA application inspection and other features like that used for the Cisco IOS Software Modular QoS CLI. Which of the following are commands associated with the MPF?

Answer :
  • All of the above

Which of the following are standards being developed for disseminating threat intelligence information?

Answer :
  • All of the above

Which type of hacker is considered a good guy?

Answer :
  • White hat

Which of the following is the way you document and preserve evidence from the time that you started the cyber-forensics investigation to the time the evidence is presented in court?

Answer :
  • Chain of custody

Which of the following are the three components in CVSS?

Answer :
  • Base, temporal, and environmental groups

Which of the following is a non-profit organization that leads several industry-wide initiatives to promote the security of applications and software?

Answer :
  • OWASP

Which of the following is a list of directories, file extensions, or even threat names that you do not want the AMP agent to scan and not to convict as malware?

Answer :
  • Exclusion set