Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 500-285 - Securing Cisco Networks with Sourcefire IPS

Page: 2 / 2
Total 60 questions

When configuring an LDAP authentication object, which server type is available?

A.

Microsoft Active Directory

B.

Yahoo

C.

Oracle

D.

SMTP

Context Explorer can be accessed by a subset of user roles. Which predefined user role is not valid for FireSIGHT event access?

A.

Administrator

B.

Intrusion Administrator

C.

Security Analyst

D.

Security Analyst (Read-Only)

Which policy controls malware blocking configuration?

A.

file policy

B.

malware policy

C.

access control policy

D.

IPS policy

Which option can you enter in the Search text box to look for the trajectory of a particular file?

A.

the MD5 hash value of the file

B.

the SHA-256 hash value of the file

C.

the URL of the file

D.

the SHA-512 hash value of the file

Which interface type allows for VLAN tagging?

A.

inline

B.

switched

C.

high-availability link

D.

passive

Which Sourcefire feature allows you to send traffic directly through the device without inspecting it?

A.

fast-path rules

B.

thresholds or suppressions

C.

blacklist

D.

automatic application bypass

Access control policy rules can be configured to block based on the conditions that you specify in each rule. Which behavior block response do you use if you want to deny and reset the connection of HTTP traffic that meets the conditions of the access control rule?

A.

interactive block with reset

B.

interactive block

C.

block

D.

block with reset

Which statement is true when adding a network to an access control rule?

A.

You can select only source networks.

B.

You must have preconfigured the network as an object.

C.

You can select the source and destination networks or network groups.

D.

You cannot include multiple networks or network groups as sources or destinations.