cisco 500-275 online test

Securing Cisco Networks with Sourcefire FireAMP Endpoints

What students need to know about the 500-275 exam

  • Total 51 Questions & Answers

Question 1 Topic 1

Topic 1
The FireAMP Mobile endpoint connector currently supports which mobile OS device?

  • A. Firefox
  • B. HTML5
  • C. Android
  • D. iPhone
Answer:

C

Discussions

Question 2 Topic 1

Topic 1
Which statement describes an advantage of the FireAMP product?

  • A. Signatures are pushed to endpoints more quickly than other antivirus products.
  • B. Superior detection algorithms on the endpoint limit the amount of work the cloud must perform.
  • C. It provides enterprise visibility.
  • D. It relies on sandboxing.
Answer:

C

Discussions

Question 3 Topic 1

Topic 1
Which feature allows retrospective detection?

  • A. Total Recall
  • B. Cloud Recall
  • C. Recall Alert
  • D. Recall Analysis
Answer:

B

Discussions

Question 4 Topic 1

Topic 1
Which statement describes an advantage of cloud-based detection?

  • A. Limited customization allows for faster detection.
  • B. Fewer resources are required on the endpoint.
  • C. Sandboxing reduces the overall management overhead of the system.
  • D. High-speed analytical engines on the endpoint limit the amount of work the cloud must perform.
Answer:

B

Discussions

Question 5 Topic 1

Topic 1
The FireAMP connector monitors the system for which type of activity?

  • A. Vulnerabilities
  • B. Enforcement of usage policies
  • C. File operations
  • D. Authentication activity
Answer:

C

Discussions

Question 6 Topic 1

Topic 1
Which disposition can be returned in response to a malware cloud lookup?

  • A. Dirty
  • B. Virus
  • C. Malware
  • D. Infected
Answer:

C

Discussions

Question 7 Topic 1

Topic 1
Which option is a detection technology that is used by FireAMP?

  • A. fuzzy matching
  • B. Norton AntiVirus
  • C. network scans
  • D. Exterminator
Answer:

A

Discussions

Question 8 Topic 1

Topic 1
If a file's SHA-256 hash is sent to the cloud, but the cloud has never seen the hash before, which disposition is returned?

  • A. Clean
  • B. Neutral
  • C. Malware
  • D. Unavailable
Answer:

B

Discussions

Question 9 Topic 1

Topic 1
File information is sent to the Sourcefire Collective Security Intelligence Cloud using which format?
A. MD5
B. SHA-1
C. filenames
D. SHA-256

Answer:

D
Topic 2, Outbreak Control Menu Items

Discussions

Question 10 Topic 2

Topic 2
How does application blocking enhance security?

  • A. It identifies and logs usage.
  • B. It tracks application abuse.
  • C. It deletes identified applications.
  • D. It blocks vulnerable applications from running, until they are patched.
Answer:

D

Discussions
To page 2