<< Prev Question Next Question >>

Question 7/90

Which operating mode allows a sensor lo prevent attacks from reaching their intended targets?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (90q)
Question 1: Why would attacks not be blocked when the Sensor monitoring ...
Question 2: Which of the following is the proper step to take if an IP a...
Question 3: Alert fillers can be applied lo which of the following senso...
Question 4: Which sensor action allows the detection and dropping of att...
Question 5: Why is the DBAdmin tool considered a preferred method of per...
Question 6: Performance debugging mode can be enabled on a sensor for a ...
Question 7: Which operating mode allows a sensor lo prevent attacks from...
Question 8: When the buffer on the alert cache has been filled, what hap...
Question 9: Which of the following activities require a reboot of a sens...
Question 10: Which server type needs to be configured as a requirement be...
Question 11: Which of the following methods are available for upgrading a...
Question 12: What is the CLI command that enables the output of the MAC/I...
Question 13: A Sensor allows the option of Layer2 forwarding for which of...
Question 14: Policies can be configured to drop packets when which of the...
Question 15: Which attack cannot be blocked when the sensor has been set ...
Question 16: What type of encryption is used for file transfers between t...
Question 17: How are packet logs viewed from within the Manager?...
Question 18: When placed in Layer3 mode, a Sensor detects a Layer2 device...
Question 19: Setting a threshold on a sensor to react if traffic volume e...
Question 20: Which is the correct syntax for the 'set dosprevenbonseverit...
Question 21: When creating policies, which of the following rule sets are...
Question 22: In double VLAN tagging, the second VLAN tag inserted into th...
Question 23: What type of encryption is used for alert channel (control c...
Question 24: Which of the following CLI commands only removes trust betwe...
Question 25: Which of the following CLI commands will not cause an automa...
Question 26: When McAfee NAC reports the host status as unmanaged with an...
Question 27: Which NSP sensor models support SSL encryption? (Choose thre...
Question 28: Which mode is used when certain hosts are located on the sam...
Question 29: ____________________are required to be configured before con...
Question 30: Which of the following CLI commands removes trust between a ...
Question 31: Which type of NAC configuration allows a host to be subjecte...
Question 32: Which mode needs to be set to redirect an unmanaged system t...
Question 33: Which database is supported for Network Security Manager?...
Question 34: Select the deployment method which enables the most effectiv...
Question 35: Which of the following commands will reestablish the Alert a...
Question 36: Which command allows an off-line signature file download fro...
Question 37: A sensor is placed in-line and is dropping traffic. This sit...
Question 38: McAfee recommends which of the following methods to cable th...
Question 39: ________________allows a host to be subjected to both DHCP b...
Question 40: IPS Policies can be enforced at which of the following senso...
Question 41: What is the command to enable the sensor to forward all traf...
Question 42: Which of the following is the correct extension for a Sensor...
Question 43: Which of the following actions can a Standby Manager of an M...
Question 44: Which policy is assigned to a child domain by default?...
Question 45: Which CLI command is used to determine that the Sensor has e...
Question 46: Which step needs to be completed before a sensor can be conf...
Question 47: Malware Protection requires which of the following feature o...
Question 48: Which domains does a Super User have full rights to access?...
Question 49: Which logs are used to determine who was logged into the Man...
Question 50: Identity Based Access Control cannot co-exist with which mod...
Question 51: Which of the following deployment modes receives a copy of t...
Question 52: Which NSP sensor models support VLAN Bridging? (Choose three...
Question 53: Which of the following items can an ACL not match?...
Question 54: Identity Based Access Control cannot co-exist with which mod...
Question 55: Which of the following are the different operational modes o...
Question 56: Which port needs to be opened for install Channel communicat...
Question 57: _____________________are a set of Access Control List (ACL) ...
Question 58: Reconnaissance Policies can be applied to which of the follo...
Question 59: Which command can be issued on a Sensor to check the health ...
Question 60: Which sensor action detects and drop attacks in real-time?...
Question 61: If the Health Level of the host cannot be determined, which ...
Question 62: DoS detection is implemented in which of the following modes...
Question 63: Which of the following should be applied to policies in both...
Question 64: Where in the Network Security Manager console can you see a ...
Question 65: What type of encryption is used for packet log transfers bet...
Question 66: Which of the following information is unique to Host Intrusi...
Question 67: If the Health level of a Host cannot be determined. McAfee N...
Question 68: Which of the following rules do sub-interfaces inherit when ...
Question 69: Setting a threshold to allow an IPS to react when traffic vo...
Question 70: Which of the following are considered part of the Operationa...
Question 71: Which port needs to be opened for Alert Viewer communication...
Question 72: Which of the following options is the best practice to use i...
Question 73: What is the command to force the sensor out of Layer 2 Passt...
Question 74: Setting a threshold limit in order for the IPS to react if t...
Question 75: As a recommended best practice, what is the total number of ...
Question 76: A sensor will redirect the host to which of the following wh...
Question 77: Which port is correctly defined for the Alert Channel on the...
Question 78: Which port needs to be opened for Packet Log Channel communi...
Question 79: By default, sensors are configured to operate in which opera...
Question 80: In double VLAN tagging, a second VLAN tag that is inserted i...
Question 81: Which of the following cannot be configured at the sub-inter...
Question 82: Which of the following are the methods used by NSP to recogn...
Question 83: Which of the following deployment modes is not included in s...
Question 84: In L3 mode, a sensor detects an L2 device based on which add...
Question 85: Which CLI command is used to copy sensor SSL certificates fr...
Question 86: The Network Security Manager provides the following built-in...
Question 87: Which command is used to manually download signature tiles f...
Question 88: Which of the following modes can be used to implement DoS de...
Question 89: A Reconnaissance Policy can be applied to which of the follo...
Question 90: Which port needs to be opened for Alert Channel communicatio...