A) block traffic
B) determine which users are involved in monitored connections
C) discover information about users
D) route traffic
Correct Answer
verified
Multiple Choice
A) class-key
B) class-value
C) classtype
D) alert-class
Correct Answer
verified
Multiple Choice
A) protocol layer
B) application
C) objects
D) devices
Correct Answer
verified
Multiple Choice
A) centralized policy management
B) compliance
C) URL filtering
D) SSL decryption
E) extensive BYOD support
Correct Answer
verified
Multiple Choice
A) dashboard properties
B) the Widget Properties button in the title bar of each widget
C) the Local Configuration page
D) Context Explorer
Correct Answer
verified
Multiple Choice
A) The host is not a target of the whitelist.
B) The host could not be evaluated because no profile exists for it.
C) The whitelist status could not be updated because the correlation policy it belongs to is not enabled.
D) The host is not on a monitored network segment.
Correct Answer
verified
Multiple Choice
A) Add blocked URLs to the global blacklist.
B) Create a Security Intelligence object that contains the blocked URLs and add the object to the access control policy.
C) Create an access control rule and, on the URLs tab, select the URLs or URL categories that are to be blocked or allowed.
D) Create a variable.
Correct Answer
verified
Multiple Choice
A) testing password strength when accessing an application
B) limiting general user access to administrative file shares
C) enforcing two-factor authentication for access to critical servers
D) issuing an alert if a noncompliant operating system is detected or if a host operating system changes to a noncompliant operating system when it was previously profiled as a compliant one
Correct Answer
verified
Multiple Choice
A) dynamic content analysis
B) Cisco Application Visibility and Control
C) centralized management and reporting
D) encryption
Correct Answer
verified
Multiple Choice
A) 0.9.8 or later
B) 1.0.0 or later
C) any version
D) none
Correct Answer
verified
Multiple Choice
A) Microsoft Active Directory
B) Yahoo
C) Oracle
D) SMTP
Correct Answer
verified
Multiple Choice
A) logging to database, SMS, SMTP, and SNMP
B) logging to database, SMTP, SNMP, and PCAP
C) logging to database, SNMP, syslog, and email
D) logging to database, PCAP, SMS, and SNMP
Correct Answer
verified
Multiple Choice
A) to specify which files to alert on
B) to specify which files to delete
C) to specify which files to ignore
D) to specify which files to sandbox
Correct Answer
verified
Multiple Choice
A) Audit Log
B) Users
C) Applications
D) Business
Correct Answer
verified
Multiple Choice
A) interfaces, CPUs, and memory
B) CPUs and memory
C) interfaces, CPUs, memory, and storage
D) interfaces and storage
Correct Answer
verified
Multiple Choice
A) pulled.config
B) porker.conf
C) snort.conf
D) pulledpork.conf
Correct Answer
verified
Multiple Choice
A) flow, frag3, stream5, application preprocessors, detection engine
B) detection engine, frag3, stream5, flow, application preprocessors
C) frag3, stream5, application preprocessors, detection engine
D) flow, stream5, frag3, application preprocessors, detection engine
Correct Answer
verified
Multiple Choice
A) SSL and HTTPS
B) PPTP and MPLS
C) client and route-based
D) point-to-point, star, and mesh
Correct Answer
verified
Multiple Choice
A) <installer package name> /desktopicon 0 /startmenu 1 /contextmenu 1 /skipdfc 0 /skiptetra 0
B) <installer package name> /desktopicon 1 /startmenu 0 /contextmenu 0 /skipdfc 0 /skiptetra 0 Real 9 Cisco 500-275 Exam
C) <installer package name> /desktopicon 0 /startmenu 0 /contextmenu 0 /skipdfc 1 /skiptetra 1
D) <installer package name> /desktopicon 1 /startmenu 0 /contextmenu 0 /skipdfc 0 /skiptetra 1
Correct Answer
verified
Multiple Choice
A) host
B) IPS event
C) anti-malware
D) networks
Correct Answer
verified
Showing 161 - 180 of 227
Related Exams