Validating Knowledge (not for Cisco Certification)
Advanced Security Architecture Specialization
As a Cisco Advanced Specialized Partner, you’ll be known for having a higher level of technical expertise than most IT partners. You can give customers more advanced solutions for their business needs – whether they’re small businesses, large enterprises, or anything in between.
With this specialization you can:
Extend security capabilities with a broad portfolio of integrated solutions
Access training to gain product expertise and learn how to integrate security across your portfolio
Create a sales pipeline, enhance profitability with Cisco incentives, and participate in the Value Incentive Program
Increase deal size through architecture cross-sell opportunities
Find and sell tested, validated security solutions that come with special pricing when you sell them
You can also take advantage of special discounts, and be recognized in Partner Locator. Stay informed with Announcements.
The Master Security Specialization builds on the Advanced Security Specialization and demonstrates the highest level of expertise with Security solutions. Learn more.
What are the two categories of variables that you can configure in Object Management?
A. System Default Variables and FireSIGHT-Specific Variables
B. System Default Variables and Procedural Variables
C. Default Variables and Custom Variables
D. Policy-Specific Variables and Procedural Variables
Which option is true regarding the $HOME_NET variable?
A. is a policy-level variable
B. has a default value of “all”
C. defines the network the active policy protects
D. is used by all rules to define the internal network
Which option is one of the three methods of updating the IP addresses in Sourcefire Security
A. subscribe to a URL intelligence feed
B. subscribe to a VRT
C. upload a list that you create
D. automatically upload lists from a network share
Which statement is true in regard to the Sourcefire Security Intelligence lists?
A. The global blacklist universally allows all traffic through the managed device.
B. The global whitelist cannot be edited.
C. IP addresses can be added to the global blacklist by clicking on interactive graphs in Context Explorer.
D. The Security Intelligence lists cannot be updated.
How do you configure URL filtering?
A. Add blocked URLs to the global blacklist.
B. Create a Security Intelligence object that contains the blocked URLs and add the object to the access control policy.
C. Create an access control rule and, on the URLs tab, select the URLs or URL categories that are to be blocked or allowed.
D. Create a variable.