Topic 4
The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on
the network are running the executable file. What must be configured within Cisco AMP for Endpoints to show this data?
B
Topic 4
A company wants a solution to aggregate the capacity of two Cisco FTD devices to make the best use of resources such as
bandwidth and connections per second. Which order of steps must be taken across the Cisco FTDs with Cisco FMC to meet
this requirement?
D
Topic 4
An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC?
D
Explanation:
It must be Subscriber.
Reference: https://www.ciscopress.com/articles/article.asp?p=2963461&seqNum=2
Topic 4
A network administrator is concerned about the high number of malware files affecting users machines. What must be done
within the access control policy in Cisco FMC to address this concern?
D
Topic 4
A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-
256 hash. Which configuration is needed to mitigate this threat?
A
Topic 4
A network engineer wants to add a third-party threat feed into the Cisco FMC for enhanced threat detection. Which action
should be taken to accomplish this goal?
D
Explanation:
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-
v623/cisco_threat_intelligence_director__tid_.html
Topic 4
An engineer has been tasked with using Cisco FMC to determine if files being sent through the network are malware. Which
two configuration tasks must be performed to achieve this file lookup? (Choose two.)
C E
Explanation:
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-
v60/Reference_a_wrapper_Chapter_topic_here.html#ID-2193-00000296
Topic 4
A network administrator discovers that a user connected to a file server and downloaded a malware file. The Cisco FMC
generated an alert for the malware event, however the user still remained connected. Which Cisco AMP file rule action within
the Cisco FMC must be set to resolve this issue?
A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-
user-guide-v541/AMP-Config.pdf
Topic 4
Which feature within the Cisco FMC web interface allows for detecting, analyzing, and blocking malware in network traffic?
B
Topic 4
What is a feature of Cisco AMP private cloud?
D
Explanation:
Reference:
https://www.cisco.com/c/en/us/products/collateral/security/fireamp-private-cloud-virtual-appliance/datasheet-c78-
742267.html