<< Prev Question Next Question >>

Question 8/58

Access control policy rules can be configured to block based on the conditions that you specify in each rule. Which behavior block response do you use if you want to deny and reset the connection of HTTP traffic that meets the conditions of the access control rule?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (58q)
Question 1: Which option is a remediation module that comes with the Sou...
Question 2: When configuring FireSIGHT detection, an administrator would...
Question 3: Which option can you enter in the Search text box to look fo...
Question 4: What is the maximum timeout value for a browser session?...
Question 5: Which mechanism should be used to write an IPS rule that foc...
Question 6: One of the goals of geolocation is to identify which option?...
Question 7: Controlling simultaneous connections is a feature of which t...
Question 8: Access control policy rules can be configured to block based...
Question 9: Which option describes the two basic components of Sourcefir...
Question 10: Which statement regarding user exemptions is true?...
Question 11: A user discovery agent can be installed on which platform?...
Question 12: Which statement is true in regard to the Sourcefire Security...
Question 13: Which statement is true regarding malware blocking over HTTP...
Question 14: Correlation policy rules allow you to construct criteria for...
Question 15: Which option describes Spero file analysis?...
Question 16: Which option is true of the Packet Information portion of th...
Question 17: Which option is used to implement suppression in the Rule Ma...
Question 18: Which option transmits policy-based alerts such as SNMP and ...
Question 19: Which statement represents detection capabilities of the HTT...
Question 20: What does the whitelist attribute value "not evaluated" indi...
Question 21: When adding source and destination ports in the Ports tab of...
Question 22: Which list identifies the possible types of alerts that the ...
Question 23: Other than navigating to the Network File Trajectory page fo...
Question 24: How do you configure URL filtering?...
Question 25: Which interface type allows for bypass mode?...
Question 26: What does packet latency thresholding measure?...
Question 27: A context box opens when you click on an event icon in the N...
Question 28: Where do you configure widget properties?...
Question 29: Which statement is true when adding a network to an access c...
Question 30: FireSIGHT recommendations appear in which layer of the Polic...
Question 31: In addition to the discovery of new hosts, FireSIGHT can als...
Question 32: A one-to-many type of scan, in which an attacker uses a sing...
Question 33: Suppose an administrator is configuring an IPS policy and at...
Question 34: Host criticality is an example of which option?...
Question 35: Which statement is true when network traffic meets the crite...
Question 36: Which option is a valid whitelist evaluation value?...
Question 37: Which statement is true concerning static NAT?...
Question 38: Context Explorer can be accessed by a subset of user roles. ...
Question 39: When configuring an LDAP authentication object, which server...
Question 40: The IP address::/0 is equivalent to which IPv4 address and n...
Question 41: Which option is not a characteristic of dashboard widgets or...
Question 42: Stacking allows a primary device to utilize which resources ...
Question 43: Which Sourcefire feature allows you to send traffic directly...
Question 44: Which option is true regarding the $HOME_NET variable?...
Question 45: Which option is true when configuring an access control rule...
Question 46: Which feature of the preprocessor configuration pages lets y...
Question 47: Which option is one of the three methods of updating the IP ...
Question 48: Which event source can have a default workflow configured?...
Question 49: Which policy controls malware blocking configuration?...
Question 50: Context Explorer can be accessed by a subset of user roles. ...
Question 51: Alert priority is established in which way?...
Question 52: What are the two categories of variables that you can config...
Question 53: When you are editing an intrusion policy, how do you know th...
Question 54: Which statement describes the meaning of a red health status...
Question 55: FireSIGHT uses three primary types of detection to understan...
Question 56: The collection of health modules and their settings is known...
Question 57: The gateway VPN feature supports which deployment types?...
Question 58: Which interface type allows for VLAN tagging?...