GarGar123

Is this your test? Login to manage it. If not, you can build an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which option can you enter in the Search text box to look for the trajectory of a particular file?
2.
1 point
Correlation policy rules allow you to construct criteria for alerting on very specific conditions.
Which option is an example of such a rule?
3.
1 point
Which option describes Spero file analysis?
4.
1 point
Which option is one of the three methods of updating the IP addresses in Sourcefire Security
Intelligence?
5.
1 point
Host criticality is an example of which option?
6.
1 point
Where do you configure widget properties?
7.
1 point
Which event source can have a default workflow configured?
8.
1 point
A context box opens when you click on an event icon in the Network File Trajectory map for a file.
Which option is an element of the box?
9.
1 point
Which option is derived from the discovery component of FireSIGHT technology?
10.
1 point
Which statement regarding user exemptions is true?
11.
1 point
A user discovery agent can be installed on which platform?
12.
1 point
When configuring an LDAP authentication object, which server type is available?
13.
1 point
When you are editing an intrusion policy, how do you know that you have changes?
14.
1 point
Which Sourcefire feature allows you to send traffic directly through the device without inspecting
it?
15.
1 point
Access control policy rules can be configured to block based on the conditions that you specify in
each rule. Which behavior block response do you use if you want to deny and reset the connection
of HTTP traffic that meets the conditions of the access control rule?
16.
1 point
When configuring FireSIGHT detection, an administrator would create a network discovery policy
and set the action to "discover". Which option is a possible type of discovery?
17.
1 point
Context Explorer can be accessed by a subset of user roles. Which predefined user role is not
valid for FireSIGHT event access?
18.
1 point
How do you configure URL filtering?
19.
1 point
Stacking allows a primary device to utilize which resources of secondary devices?
20.
1 point
What is the maximum timeout value for a browser session?
21.
1 point
FireSIGHT uses three primary types of detection to understand the environment in which it is
deployed. Which option is one of the detection types?
22.
1 point
According to Gartner, which criteria distinguish a next-generation IPS?
23.
1 point
The gateway VPN feature supports which deployment types?
24.
1 point
Which Cisco AMP deployment would you recommend for advanced customers that want comprehensive threat protection, investigation, and response?
25.
1 point
Which statement is true when adding a network to an access control rule?
26.
1 point
Which option transmits policy-based alerts such as SNMP and syslog?
27.
1 point
Which statement is true in regard to the Sourcefire Security Intelligence lists?
28.
1 point
Which interface type allows for bypass mode?
29.
1 point
In addition to the discovery of new hosts, FireSIGHT can also perform which function?
30.
1 point
One of the goals of geolocation is to identify which option?
31.
1 point
FireSIGHT recommendations appear in which layer of the Policy Layers page?
32.
1 point
Which feature in the Cisco AMP solution provides the ability to track malware activity over time?
33.
1 point
Other than navigating to the Network File Trajectory page for a file, which option is an alternative
way of accessing the network trajectory of a file?
34.
1 point
Which option is not a characteristic of dashboard widgets or Context Explorer?
35.
1 point
Cisco FireSIGHT can provide visibility into which three types of information that competing products cannot? (Choose three.)
36.
1 point
Which option is true when configuring an access control rule?
37.
1 point
Which option is a valid whitelist evaluation value?
38.
1 point
The IP address::/0 is equivalent to which IPv4 address and netmask?
39.
1 point
Which statement describes the meaning of a red health status icon?
40.
1 point
The collection of health modules and their settings is known as which option?
41.
1 point
When adding source and destination ports in the Ports tab of the access control policy rule editor,
which restriction is in place?
42.
1 point
Which interface type allows for VLAN tagging?
43.
1 point
Which statement is true regarding malware blocking over HTTP?
44.
1 point
What are the two categories of variables that you can configure in Object Management?
45.
1 point
Which option is true of the Packet Information portion of the Packet View screen?
46.
1 point
Context Explorer can be accessed by a subset of user roles. Which predefined user role is valid
for FireSIGHT event access?
47.
1 point
Which option is used to implement suppression in the Rule Management user interface?
48.
1 point
Which policy controls malware blocking configuration?
49.
1 point
Which option is true regarding the $HOME_NET variable?
50.
1 point
Which statement is true concerning static NAT?