<< Prev Question Next Question >>

Question 10/58

Which statement regarding user exemptions is true?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (58q)
Question 1: Which option is a remediation module that comes with the Sou...
Question 2: When configuring FireSIGHT detection, an administrator would...
Question 3: Which option can you enter in the Search text box to look fo...
Question 4: What is the maximum timeout value for a browser session?...
Question 5: Which mechanism should be used to write an IPS rule that foc...
Question 6: One of the goals of geolocation is to identify which option?...
Question 7: Controlling simultaneous connections is a feature of which t...
Question 8: Access control policy rules can be configured to block based...
Question 9: Which option describes the two basic components of Sourcefir...
Question 10: Which statement regarding user exemptions is true?...
Question 11: A user discovery agent can be installed on which platform?...
Question 12: Which statement is true in regard to the Sourcefire Security...
Question 13: Which statement is true regarding malware blocking over HTTP...
Question 14: Correlation policy rules allow you to construct criteria for...
Question 15: Which option describes Spero file analysis?...
Question 16: Which option is true of the Packet Information portion of th...
Question 17: Which option is used to implement suppression in the Rule Ma...
Question 18: Which option transmits policy-based alerts such as SNMP and ...
Question 19: Which statement represents detection capabilities of the HTT...
Question 20: What does the whitelist attribute value "not evaluated" indi...
Question 21: When adding source and destination ports in the Ports tab of...
Question 22: Which list identifies the possible types of alerts that the ...
Question 23: Other than navigating to the Network File Trajectory page fo...
Question 24: How do you configure URL filtering?...
Question 25: Which interface type allows for bypass mode?...
Question 26: What does packet latency thresholding measure?...
Question 27: A context box opens when you click on an event icon in the N...
Question 28: Where do you configure widget properties?...
Question 29: Which statement is true when adding a network to an access c...
Question 30: FireSIGHT recommendations appear in which layer of the Polic...
Question 31: In addition to the discovery of new hosts, FireSIGHT can als...
Question 32: A one-to-many type of scan, in which an attacker uses a sing...
Question 33: Suppose an administrator is configuring an IPS policy and at...
Question 34: Host criticality is an example of which option?...
Question 35: Which statement is true when network traffic meets the crite...
Question 36: Which option is a valid whitelist evaluation value?...
Question 37: Which statement is true concerning static NAT?...
Question 38: Context Explorer can be accessed by a subset of user roles. ...
Question 39: When configuring an LDAP authentication object, which server...
Question 40: The IP address::/0 is equivalent to which IPv4 address and n...
Question 41: Which option is not a characteristic of dashboard widgets or...
Question 42: Stacking allows a primary device to utilize which resources ...
Question 43: Which Sourcefire feature allows you to send traffic directly...
Question 44: Which option is true regarding the $HOME_NET variable?...
Question 45: Which option is true when configuring an access control rule...
Question 46: Which feature of the preprocessor configuration pages lets y...
Question 47: Which option is one of the three methods of updating the IP ...
Question 48: Which event source can have a default workflow configured?...
Question 49: Which policy controls malware blocking configuration?...
Question 50: Context Explorer can be accessed by a subset of user roles. ...
Question 51: Alert priority is established in which way?...
Question 52: What are the two categories of variables that you can config...
Question 53: When you are editing an intrusion policy, how do you know th...
Question 54: Which statement describes the meaning of a red health status...
Question 55: FireSIGHT uses three primary types of detection to understan...
Question 56: The collection of health modules and their settings is known...
Question 57: The gateway VPN feature supports which deployment types?...
Question 58: Which interface type allows for VLAN tagging?...