<< Prev Question Next Question >>

Question 37/56

When adding source and destination ports in the Ports tab of the access control policy rule editor, which restriction is in place?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (56q)
Question 1: Context Explorer can be accessed by a subset of user roles. ...
Question 2: Suppose an administrator is configuring an IPS policy and at...
Question 3: Which option is true when configuring an access control rule...
Question 4: Which statement is true when adding a network to an access c...
Question 5: When configuring an LDAP authentication object, which server...
Question 6: Host criticality is an example of which option?...
Question 7: Which option can you enter in the Search text box to look fo...
Question 8: Which feature of the preprocessor configuration pages lets y...
Question 9: Which option describes the two basic components of Sourcefir...
Question 10: Which option transmits policy-based alerts such as SNMP and ...
Question 11: The collection of health modules and their settings is known...
Question 12: Which option describes Spero file analysis?...
Question 13: FireSIGHT recommendations appear in which layer of the Polic...
Question 14: Other than navigating to the Network File Trajectory page fo...
Question 15: Which option is derived from the discovery component of Fire...
Question 16: Controlling simultaneous connections is a feature of which t...
Question 17: Remote access to the Defense Center database has which chara...
Question 18: What are the two categories of variables that you can config...
Question 19: Which option is not a characteristic of dashboard widgets or...
Question 20: Which statement is true concerning static NAT?...
Question 21: Which statement is true regarding malware blocking over HTTP...
Question 22: Which statement is true in regard to the Sourcefire Security...
Question 23: A user discovery agent can be installed on which platform?...
Question 24: Which list identifies the possible types of alerts that the ...
Question 25: Which statement is true when network traffic meets the crite...
Question 26: Correlation policy rules allow you to construct criteria for...
Question 27: Which option is a valid whitelist evaluation value?...
Question 28: Which mechanism should be used to write an IPS rule that foc...
Question 29: When you are editing an intrusion policy, how do you know th...
Question 30: A context box opens when you click on an event icon in the N...
Question 31: Which option is a remediation module that comes with the Sou...
Question 32: What does packet latency thresholding measure?...
Question 33: Context Explorer can be accessed by a subset of user roles. ...
Question 34: Stacking allows a primary device to utilize which resources ...
Question 35: How do you configure URL filtering?...
Question 36: Which event source can have a default workflow configured?...
Question 37: When adding source and destination ports in the Ports tab of...
Question 38: One of the goals of geolocation is to identify which option?...
Question 39: Alert priority is established in which way?...
Question 40: Which option is one of the three methods of updating the IP ...
Question 41: Where do you configure widget properties?...
Question 42: Which interface type allows for bypass mode?...
Question 43: When configuring FireSIGHT detection, an administrator would...
Question 44: What is the maximum timeout value for a browser session?...
Question 45: Which option is used to implement suppression in the Rule Ma...
Question 46: What does the whitelist attribute value "not evaluated" indi...
Question 47: Which option is true regarding the $HOME_NET variable?...
Question 48: Which option is true of the Packet Information portion of th...
Question 49: Which policy controls malware blocking configuration?...
Question 50: Which Sourcefire feature allows you to send traffic directly...
Question 51: Which statement represents detection capabilities of the HTT...
Question 52: Access control policy rules can be configured to block based...
Question 53: The IP address::/0 is equivalent to which IPv4 address and n...
Question 54: Which statement describes the meaning of a red health status...
Question 55: Which statement regarding user exemptions is true?...
Question 56: FireSIGHT uses three primary types of detection to understan...