<< Prev Question Next Question >>

Question 46/60

How do you configure URL filtering?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
Question 1: Which statement regarding user exemptions is true?...
Question 2: Access control policy rules can be configured to block based...
Question 3: Context Explorer can be accessed by a subset of user roles. ...
Question 4: Which statement is true when network traffic meets the crite...
Question 5: A one-to-many type of scan, in which an attacker uses a sing...
Question 6: Which option is a valid whitelist evaluation value?...
Question 7: One of the goals of geolocation is to identify which option?...
Question 8: Context Explorer can be accessed by a subset of user roles. ...
Question 9: Alert priority is established in which way?...
Question 10: Which event source can have a default workflow configured?...
Question 11: Which feature of the preprocessor configuration pages lets y...
Question 12: The gateway VPN feature supports which deployment types?...
Question 13: Stacking allows a primary device to utilize which resources ...
Question 14: Which policy controls malware blocking configuration?...
Question 15: Which interface type allows for VLAN tagging? Real 17 Cisco ...
Question 16: Real 16 Cisco 500-285 Exam Which Sourcefire feature allows y...
Question 17: Which statement is true when adding a network to an access c...
Question 18: Suppose an administrator is configuring an IPS policy and at...
Question 19: Which option describes the two basic components of Sourcefir...
Question 20: Which option transmits policy-based alerts such as SNMP and ...
Question 21: A context box opens when you click on an event icon in the N...
Question 22: Which interface type allows for bypass mode?...
Question 23: When you are editing an intrusion policy, how do you know th...
Question 24: Which option is a remediation module that comes with the Sou...
Question 25: Which mechanism should be used to write an IPS rule that foc...
Question 26: Where do you configure widget properties?...
Question 27: Which statement describes the meaning of a red health status...
Question 28: Which option describes Spero file analysis?...
Question 29: Host criticality is an example of which option?...
Question 30: What are the two categories of variables that you can config...
Question 31: What does packet latency thresholding measure?...
Question 32: What is the maximum timeout value for a browser session?...
Question 33: Which option is true of the Packet Information portion of th...
Question 34: Correlation policy rules allow you to construct criteria for...
Question 35: The collection of health modules and their settings is known...
Question 36: Remote access to the Defense Center database has which chara...
Question 37: Which statement represents detection capabilities of the HTT...
Question 38: What does the whitelist attribute value "not evaluated" indi...
Question 39: Which option is one of the three methods of updating the IP ...
Question 40: Which statement is true in regard to the Sourcefire Security...
Question 41: When configuring an LDAP authentication object, which server...
Question 42: Which option is true regarding the $HOME_NET variable?...
Question 43: A user discovery agent can be installed on which platform?...
Question 44: Which statement is true concerning static NAT?...
Question 45: Which option can you enter in the Search text box to look fo...
Question 46: How do you configure URL filtering?...
Question 47: Which option is derived from the discovery component of Fire...
Question 48: FireSIGHT uses three primary types of detection to understan...
Question 49: When configuring FireSIGHT detection, an administrator would...
Question 50: Which option is used to implement suppression in the Rule Ma...
Question 51: FireSIGHT recommendations appear in which layer of the Polic...
Question 52: Controlling simultaneous connections is a feature of which t...
Question 53: Which option is not a characteristic of dashboard widgets or...
Question 54: Which statement is true regarding malware blocking over HTTP...
Question 55: Which list identifies the possible types of alerts that the ...
Question 56: Other than navigating to the Network File Trajectory page fo...
Question 57: The IP address::/0 is equivalent to which IPv4 address and n...
Question 58: In addition to the discovery of new hosts, FireSIGHT can als...
Question 59: When adding source and destination ports in the Ports tab of...
Question 60: Which option is true when configuring an access control rule...