Filters
Question type

Study Flashcards

In addition to the discovery of new hosts, FireSIGHT can also perform which function?


A) block traffic
B) determine which users are involved in monitored connections
C) discover information about users
D) route traffic

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which rule keyword categorizes alerts into attack classes?


A) class-key
B) class-value
C) classtype
D) alert-class

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

FireSIGHT uses three primary types of detection to understand the environment in which it is deployed. Which option is one of the detection types?


A) protocol layer
B) application
C) objects
D) devices

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which Cisco Identity Services Engine feature controls access and policies for campuses and branches, wired and wireless devices, and guests, from a single location?


A) centralized policy management
B) compliance
C) URL filtering
D) SSL decryption
E) extensive BYOD support

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Where do you configure widget properties?


A) dashboard properties
B) the Widget Properties button in the title bar of each widget
C) the Local Configuration page
D) Context Explorer

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What does the whitelist attribute value "not evaluated" indicate?


A) The host is not a target of the whitelist.
B) The host could not be evaluated because no profile exists for it.
C) The whitelist status could not be updated because the correlation policy it belongs to is not enabled.
D) The host is not on a monitored network segment.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

How do you configure URL filtering?


A) Add blocked URLs to the global blacklist.
B) Create a Security Intelligence object that contains the blocked URLs and add the object to the access control policy.
C) Create an access control rule and, on the URLs tab, select the URLs or URL categories that are to be blocked or allowed.
D) Create a variable.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Correlation policy rules allow you to construct criteria for alerting on very specific conditions. Which option is an example of such a rule?


A) testing password strength when accessing an application
B) limiting general user access to administrative file shares
C) enforcing two-factor authentication for access to critical servers
D) issuing an alert if a noncompliant operating system is detected or if a host operating system changes to a noncompliant operating system when it was previously profiled as a compliant one

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which feature of content security enables administrators to block Facebook videos while allowing posts and messages?


A) dynamic content analysis
B) Cisco Application Visibility and Control
C) centralized management and reporting
D) encryption

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which version of libpcap does DAQ require?


A) 0.9.8 or later
B) 1.0.0 or later
C) any version
D) none

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

When configuring an LDAP authentication object, which server type is available?


A) Microsoft Active Directory
B) Yahoo
C) Oracle
D) SMTP

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which list identifies the possible types of alerts that the Sourcefire System can generate as notification of events or policy violations?


A) logging to database, SMS, SMTP, and SNMP
B) logging to database, SMTP, SNMP, and PCAP
C) logging to database, SNMP, syslog, and email
D) logging to database, PCAP, SMS, and SNMP

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Custom whitelists are used for which purpose?


A) to specify which files to alert on
B) to specify which files to delete
C) to specify which files to ignore
D) to specify which files to sandbox

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The Accounts menu contains items that are related to FireAMP console accounts. Which menu allows you to set the default group policy?


A) Audit Log
B) Users
C) Applications
D) Business

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Stacking allows a primary device to utilize which resources of secondary devices?


A) interfaces, CPUs, and memory
B) CPUs and memory
C) interfaces, CPUs, memory, and storage
D) interfaces and storage

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which file is the primary configuration file for keeping rules up to date?


A) pulled.config
B) porker.conf
C) snort.conf
D) pulledpork.conf

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When Snort receives packets, in which order are they placed into the preprocessors?


A) flow, frag3, stream5, application preprocessors, detection engine
B) detection engine, frag3, stream5, flow, application preprocessors
C) frag3, stream5, application preprocessors, detection engine
D) flow, stream5, frag3, application preprocessors, detection engine

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The gateway VPN feature supports which deployment types?


A) SSL and HTTPS
B) PPTP and MPLS
C) client and route-based
D) point-to-point, star, and mesh

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the default command-line switch configuration, if you run a connector installation with no parameters?


A) <installer package name> /desktopicon 0 /startmenu 1 /contextmenu 1 /skipdfc 0 /skiptetra 0
B) <installer package name> /desktopicon 1 /startmenu 0 /contextmenu 0 /skipdfc 0 /skiptetra 0 Real 9 Cisco 500-275 Exam
C) <installer package name> /desktopicon 0 /startmenu 0 /contextmenu 0 /skipdfc 1 /skiptetra 1
D) <installer package name> /desktopicon 1 /startmenu 0 /contextmenu 0 /skipdfc 0 /skiptetra 1

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

When configuring FireSIGHT detection, an administrator would create a network discovery policy and set the action to "discover". Which option is a possible type of discovery?


A) host
B) IPS event
C) anti-malware
D) networks

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 161 - 180 of 227

Related Exams

Show Answer