500-285 Securing Cisco Networks with Sourcefire Intrusion Prevention System (Exam 5)

500-285 Securing Cisco Networks with Sourcefire Intrusion Prevention System (Exam 5)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Custom whitelists are used for which purpose?

  • The FireAMP connector supports which proxy type?

  • What do policies enable you to do?

  • What is the default clean disposition cache setting?

  • The Update Window allows you to perform which action?

  • What is a valid data source for DFC Windows connector policy configuration?

  • Which hosts merit special consideration for crafting a policy?

  • Which statement represents a best practice for deploying on Windows servers?

  • Incident responders use which policy mode for outbreak control?

  • Which question should be in your predeployment checklist?

  • From the Deployment screen, you can deploy agents via which mechanism?

  • What is the default command-line switch configuration, if you run a connector inst...

  • When you are viewing information about a computer, what is displayed?

  • What is the first system that is infected with a particular malware called?

  • Which action can you take from the Detections/Quarantine screen?

  • How many days' worth of data do the widgets on the dashboard page display?

  • Which type of activity is shown in the Device Trajectory page?

  • Which statement is true about the Device Trajectory feature?

  • How can customers feed new intelligence such as files and hashes to FireAMP?

  • Which information does the File Trajectory feature show?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:42 a.m.
    help_outline
    20 questions
    dvr
    0 completed
    remove_red_eye
    4 views
    people
    0 takers
    folder

  • 500-285 Securing Cisco Networks with Sourcefire Intrusion Prevention System (Exam 5) QR code

Ratings

star_borderstar_borderstar_borderstar_borderstar_border
ratings