642-513 HIPS - Securing Hosts Using Cisco Security Agent Exam (Exam 1)

642-513 HIPS - Securing Hosts Using Cisco Security Agent Exam (Exam 1)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which of these is a reason for using groups to administer Agents?

  • Which three items make up rules? (Choose three.)

  • Which action do you take when you are ready to deploy your CSA configuration to sy...

  • Which one of the five phases of an attack attempts to become resident on a target?

  • What is the purpose of the Audit Trail function?

  • In which type of rules are network address sets used?

  • Which three of these does the buffer overflow rule detect on a UNIX operating syst...

  • When should you use preconfigured application classes for application deployment i...

  • Which systems with specific operating systems are automatically placed into mandat...

  • What is the purpose of network access control rules?

  • What is the purpose of the Compare tool?

  • If a Solaris or Windows system is not rebooted after CSA installation, which three...

  • For which operating system is the network shield rule available?

  • What is the maximum number of characters that a policy name can contain?

  • What information is logged for registry access control?

  • Which protocol should never be disabled on the CSA MC?

  • Which information is logged for file access control?

  • Which action must be taken before a host can enforce rules when it has been moved ...

  • What is a benefit of putting hosts into groups?

  • Which two attacks could an attacker use during the probe phase of an attack? (Choo...

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:38 a.m.
    help_outline
    20 questions
    dvr
    0 completed
    remove_red_eye
    2 views
    people
    0 takers
    folder

  • 642-513 HIPS - Securing Hosts Using Cisco Security Agent Exam (Exam 1) QR code

Ratings

star_borderstar_borderstar_borderstar_borderstar_border
ratings