<< Prev Question Next Question >>

Question 37/90

A sensor is placed in-line and is dropping traffic. This situation demands an immediate removal of the sensor from the network to let traffic flow uninterrupted. Which option will you use to verify whether the issue is due to sensor configuration or network congestion?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (90q)
Question 1: Why would attacks not be blocked when the Sensor monitoring ...
Question 2: Which of the following is the proper step to take if an IP a...
Question 3: Alert fillers can be applied lo which of the following senso...
Question 4: Which sensor action allows the detection and dropping of att...
Question 5: Why is the DBAdmin tool considered a preferred method of per...
Question 6: Performance debugging mode can be enabled on a sensor for a ...
Question 7: Which operating mode allows a sensor lo prevent attacks from...
Question 8: When the buffer on the alert cache has been filled, what hap...
Question 9: Which of the following activities require a reboot of a sens...
Question 10: Which server type needs to be configured as a requirement be...
Question 11: Which of the following methods are available for upgrading a...
Question 12: What is the CLI command that enables the output of the MAC/I...
Question 13: A Sensor allows the option of Layer2 forwarding for which of...
Question 14: Policies can be configured to drop packets when which of the...
Question 15: Which attack cannot be blocked when the sensor has been set ...
Question 16: What type of encryption is used for file transfers between t...
Question 17: How are packet logs viewed from within the Manager?...
Question 18: When placed in Layer3 mode, a Sensor detects a Layer2 device...
Question 19: Setting a threshold on a sensor to react if traffic volume e...
Question 20: Which is the correct syntax for the 'set dosprevenbonseverit...
Question 21: When creating policies, which of the following rule sets are...
Question 22: In double VLAN tagging, the second VLAN tag inserted into th...
Question 23: What type of encryption is used for alert channel (control c...
Question 24: Which of the following CLI commands only removes trust betwe...
Question 25: Which of the following CLI commands will not cause an automa...
Question 26: When McAfee NAC reports the host status as unmanaged with an...
Question 27: Which NSP sensor models support SSL encryption? (Choose thre...
Question 28: Which mode is used when certain hosts are located on the sam...
Question 29: ____________________are required to be configured before con...
Question 30: Which of the following CLI commands removes trust between a ...
Question 31: Which type of NAC configuration allows a host to be subjecte...
Question 32: Which mode needs to be set to redirect an unmanaged system t...
Question 33: Which database is supported for Network Security Manager?...
Question 34: Select the deployment method which enables the most effectiv...
Question 35: Which of the following commands will reestablish the Alert a...
Question 36: Which command allows an off-line signature file download fro...
Question 37: A sensor is placed in-line and is dropping traffic. This sit...
Question 38: McAfee recommends which of the following methods to cable th...
Question 39: ________________allows a host to be subjected to both DHCP b...
Question 40: IPS Policies can be enforced at which of the following senso...
Question 41: What is the command to enable the sensor to forward all traf...
Question 42: Which of the following is the correct extension for a Sensor...
Question 43: Which of the following actions can a Standby Manager of an M...
Question 44: Which policy is assigned to a child domain by default?...
Question 45: Which CLI command is used to determine that the Sensor has e...
Question 46: Which step needs to be completed before a sensor can be conf...
Question 47: Malware Protection requires which of the following feature o...
Question 48: Which domains does a Super User have full rights to access?...
Question 49: Which logs are used to determine who was logged into the Man...
Question 50: Identity Based Access Control cannot co-exist with which mod...
Question 51: Which of the following deployment modes receives a copy of t...
Question 52: Which NSP sensor models support VLAN Bridging? (Choose three...
Question 53: Which of the following items can an ACL not match?...
Question 54: Identity Based Access Control cannot co-exist with which mod...
Question 55: Which of the following are the different operational modes o...
Question 56: Which port needs to be opened for install Channel communicat...
Question 57: _____________________are a set of Access Control List (ACL) ...
Question 58: Reconnaissance Policies can be applied to which of the follo...
Question 59: Which command can be issued on a Sensor to check the health ...
Question 60: Which sensor action detects and drop attacks in real-time?...
Question 61: If the Health Level of the host cannot be determined, which ...
Question 62: DoS detection is implemented in which of the following modes...
Question 63: Which of the following should be applied to policies in both...
Question 64: Where in the Network Security Manager console can you see a ...
Question 65: What type of encryption is used for packet log transfers bet...
Question 66: Which of the following information is unique to Host Intrusi...
Question 67: If the Health level of a Host cannot be determined. McAfee N...
Question 68: Which of the following rules do sub-interfaces inherit when ...
Question 69: Setting a threshold to allow an IPS to react when traffic vo...
Question 70: Which of the following are considered part of the Operationa...
Question 71: Which port needs to be opened for Alert Viewer communication...
Question 72: Which of the following options is the best practice to use i...
Question 73: What is the command to force the sensor out of Layer 2 Passt...
Question 74: Setting a threshold limit in order for the IPS to react if t...
Question 75: As a recommended best practice, what is the total number of ...
Question 76: A sensor will redirect the host to which of the following wh...
Question 77: Which port is correctly defined for the Alert Channel on the...
Question 78: Which port needs to be opened for Packet Log Channel communi...
Question 79: By default, sensors are configured to operate in which opera...
Question 80: In double VLAN tagging, a second VLAN tag that is inserted i...
Question 81: Which of the following cannot be configured at the sub-inter...
Question 82: Which of the following are the methods used by NSP to recogn...
Question 83: Which of the following deployment modes is not included in s...
Question 84: In L3 mode, a sensor detects an L2 device based on which add...
Question 85: Which CLI command is used to copy sensor SSL certificates fr...
Question 86: The Network Security Manager provides the following built-in...
Question 87: Which command is used to manually download signature tiles f...
Question 88: Which of the following modes can be used to implement DoS de...
Question 89: A Reconnaissance Policy can be applied to which of the follo...
Question 90: Which port needs to be opened for Alert Channel communicatio...