Which step would have prevented this situation?
A monitored interface on a clustered pair of ScreenOS devices goes down and both devices became
ineligible to be master of the cluster. As a result, neither device is passing traffic.
Which step would have prevented this situation?
which two statements are true for this scenario?
What is causing the problem?
You are receiving 3000 SYN packets per second from multiple outside sources to the same
destination IP address in your network. You want the SYN proxy Screen option to engage when SYN
packets exceed 2000 per second, but the SYN proxy is not engaging.
What is causing the problem?
What is "the location of an attack pattern protocol stream"?
What is “the location of an attack pattern protocol stream”?
Which two actions can you configure the device to take?
You have configured deep-packet inspection on a ScreenOS device. You have not modified the
default threshold values. The device detects a single session that matches an attack.
Which two actions can you configure the device to take? (Choose two.)
What does the action "drop packet" instruct the sensor to do?
What does the action “drop packet” instruct the sensor to do?
What is "a signature or protocol anomaly combined with context information"?
What is “a signature or protocol anomaly combined with context information”?
What are two ways to configure the device?
A ScreenOS device detects a large number of sessions that match the same deep inspection attack
object. What are two ways to configure the device? (Choose two.)
What is the correct order for these steps?
which three protocols?
The ScreenOS software performs virus scanning for which three protocols? (Choose three.)