<< Prev Question Next Question >>

Question 18/60

Suppose an administrator is configuring an IPS policy and attempts to enable intrusion rules that require the operation of the TCP stream preprocessor, but the TCP stream preprocessor is turned Real 20
Cisco 500-285 Exam
off. Which statement is true in this situation?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
Question 1: Which statement regarding user exemptions is true?...
Question 2: Access control policy rules can be configured to block based...
Question 3: Context Explorer can be accessed by a subset of user roles. ...
Question 4: Which statement is true when network traffic meets the crite...
Question 5: A one-to-many type of scan, in which an attacker uses a sing...
Question 6: Which option is a valid whitelist evaluation value?...
Question 7: One of the goals of geolocation is to identify which option?...
Question 8: Context Explorer can be accessed by a subset of user roles. ...
Question 9: Alert priority is established in which way?...
Question 10: Which event source can have a default workflow configured?...
Question 11: Which feature of the preprocessor configuration pages lets y...
Question 12: The gateway VPN feature supports which deployment types?...
Question 13: Stacking allows a primary device to utilize which resources ...
Question 14: Which policy controls malware blocking configuration?...
Question 15: Which interface type allows for VLAN tagging? Real 17 Cisco ...
Question 16: Real 16 Cisco 500-285 Exam Which Sourcefire feature allows y...
Question 17: Which statement is true when adding a network to an access c...
Question 18: Suppose an administrator is configuring an IPS policy and at...
Question 19: Which option describes the two basic components of Sourcefir...
Question 20: Which option transmits policy-based alerts such as SNMP and ...
Question 21: A context box opens when you click on an event icon in the N...
Question 22: Which interface type allows for bypass mode?...
Question 23: When you are editing an intrusion policy, how do you know th...
Question 24: Which option is a remediation module that comes with the Sou...
Question 25: Which mechanism should be used to write an IPS rule that foc...
Question 26: Where do you configure widget properties?...
Question 27: Which statement describes the meaning of a red health status...
Question 28: Which option describes Spero file analysis?...
Question 29: Host criticality is an example of which option?...
Question 30: What are the two categories of variables that you can config...
Question 31: What does packet latency thresholding measure?...
Question 32: What is the maximum timeout value for a browser session?...
Question 33: Which option is true of the Packet Information portion of th...
Question 34: Correlation policy rules allow you to construct criteria for...
Question 35: The collection of health modules and their settings is known...
Question 36: Remote access to the Defense Center database has which chara...
Question 37: Which statement represents detection capabilities of the HTT...
Question 38: What does the whitelist attribute value "not evaluated" indi...
Question 39: Which option is one of the three methods of updating the IP ...
Question 40: Which statement is true in regard to the Sourcefire Security...
Question 41: When configuring an LDAP authentication object, which server...
Question 42: Which option is true regarding the $HOME_NET variable?...
Question 43: A user discovery agent can be installed on which platform?...
Question 44: Which statement is true concerning static NAT?...
Question 45: Which option can you enter in the Search text box to look fo...
Question 46: How do you configure URL filtering?...
Question 47: Which option is derived from the discovery component of Fire...
Question 48: FireSIGHT uses three primary types of detection to understan...
Question 49: When configuring FireSIGHT detection, an administrator would...
Question 50: Which option is used to implement suppression in the Rule Ma...
Question 51: FireSIGHT recommendations appear in which layer of the Polic...
Question 52: Controlling simultaneous connections is a feature of which t...
Question 53: Which option is not a characteristic of dashboard widgets or...
Question 54: Which statement is true regarding malware blocking over HTTP...
Question 55: Which list identifies the possible types of alerts that the ...
Question 56: Other than navigating to the Network File Trajectory page fo...
Question 57: The IP address::/0 is equivalent to which IPv4 address and n...
Question 58: In addition to the discovery of new hosts, FireSIGHT can als...
Question 59: When adding source and destination ports in the Ports tab of...
Question 60: Which option is true when configuring an access control rule...