<< Prev Question Next Question >>

Question 2/56

Suppose an administrator is configuring an IPS policy and attempts to enable intrusion rules that require the operation of the TCP stream preprocessor, but the TCP stream preprocessor is turned off. Which statement is true in this situation?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (56q)
Question 1: Context Explorer can be accessed by a subset of user roles. ...
Question 2: Suppose an administrator is configuring an IPS policy and at...
Question 3: Which option is true when configuring an access control rule...
Question 4: Which statement is true when adding a network to an access c...
Question 5: When configuring an LDAP authentication object, which server...
Question 6: Host criticality is an example of which option?...
Question 7: Which option can you enter in the Search text box to look fo...
Question 8: Which feature of the preprocessor configuration pages lets y...
Question 9: Which option describes the two basic components of Sourcefir...
Question 10: Which option transmits policy-based alerts such as SNMP and ...
Question 11: The collection of health modules and their settings is known...
Question 12: Which option describes Spero file analysis?...
Question 13: FireSIGHT recommendations appear in which layer of the Polic...
Question 14: Other than navigating to the Network File Trajectory page fo...
Question 15: Which option is derived from the discovery component of Fire...
Question 16: Controlling simultaneous connections is a feature of which t...
Question 17: Remote access to the Defense Center database has which chara...
Question 18: What are the two categories of variables that you can config...
Question 19: Which option is not a characteristic of dashboard widgets or...
Question 20: Which statement is true concerning static NAT?...
Question 21: Which statement is true regarding malware blocking over HTTP...
Question 22: Which statement is true in regard to the Sourcefire Security...
Question 23: A user discovery agent can be installed on which platform?...
Question 24: Which list identifies the possible types of alerts that the ...
Question 25: Which statement is true when network traffic meets the crite...
Question 26: Correlation policy rules allow you to construct criteria for...
Question 27: Which option is a valid whitelist evaluation value?...
Question 28: Which mechanism should be used to write an IPS rule that foc...
Question 29: When you are editing an intrusion policy, how do you know th...
Question 30: A context box opens when you click on an event icon in the N...
Question 31: Which option is a remediation module that comes with the Sou...
Question 32: What does packet latency thresholding measure?...
Question 33: Context Explorer can be accessed by a subset of user roles. ...
Question 34: Stacking allows a primary device to utilize which resources ...
Question 35: How do you configure URL filtering?...
Question 36: Which event source can have a default workflow configured?...
Question 37: When adding source and destination ports in the Ports tab of...
Question 38: One of the goals of geolocation is to identify which option?...
Question 39: Alert priority is established in which way?...
Question 40: Which option is one of the three methods of updating the IP ...
Question 41: Where do you configure widget properties?...
Question 42: Which interface type allows for bypass mode?...
Question 43: When configuring FireSIGHT detection, an administrator would...
Question 44: What is the maximum timeout value for a browser session?...
Question 45: Which option is used to implement suppression in the Rule Ma...
Question 46: What does the whitelist attribute value "not evaluated" indi...
Question 47: Which option is true regarding the $HOME_NET variable?...
Question 48: Which option is true of the Packet Information portion of th...
Question 49: Which policy controls malware blocking configuration?...
Question 50: Which Sourcefire feature allows you to send traffic directly...
Question 51: Which statement represents detection capabilities of the HTT...
Question 52: Access control policy rules can be configured to block based...
Question 53: The IP address::/0 is equivalent to which IPv4 address and n...
Question 54: Which statement describes the meaning of a red health status...
Question 55: Which statement regarding user exemptions is true?...
Question 56: FireSIGHT uses three primary types of detection to understan...