Question 6 of 563
Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.)
Correct Answer: A, B, E

Question 7 of 563
What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two.)
Correct Answer: B, D

Question 8 of 563
Which CLI command is used to generate firewall debug messages on a Cisco FirePOWER sensor?
Correct Answer: B

Question 9 of 563
What is a difference between a Cisco Content Security Management virtual appliance and a physical appliance?
Correct Answer: B

Question 10 of 563
Which Cisco technology secures the network through malware filtering, category-based control, and reputation-based control?
Correct Answer: D