Notifications
Clear all
Topic starter
12/09/2022 3:02 am
In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)
- A . Traffic inspection can be interrupted temporarily when configuration changes are deployed.
- B . The system performs intrusion inspection followed by file inspection.
- C . They can block traffic based on Security Intelligence data.
- D . File policies use an associated variable set to perform intrusion prevention.
- E . The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.
Suggested Answer: AC
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Access_Control_Using_Intrusion_and_File_Policies.html
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Access_Control_Using_Intrusion_and_File_Policies.html