Which two statements describe action versus IP action?
Which two statements describe action versus IP action? (Choose two.)
What is the correct order for these steps?
which feature allows the traffic to continue to flow through the device?
If the power is lost to an IDP sensor, which feature allows the traffic to continue to flow through the
device?
What should you do next?
You implement Traffic Anomaly detection and you find numerous alerts of port scans from your
security auditing team that you want to ignore. You create an address book entry for the security
audit team specifying the IP addresses of those machines. What should you do next?
Which three actions should be taken on a rule in the IDP rule base when the sensor is in transparent mode?
Which three actions should be taken on a rule in the IDP rule base when the sensor is in transparent
mode? (Choose three.)
What contains instructions on how the sensor should decode protocols?
What contains instructions on how the sensor should decode protocols?
which command would have produced this output?
What is the function of Terminate Match?
What is the function of Terminate Match?
which four components must be specified?
When creating a new signature-based attack object, which four components must be specified?
(Choose four.)
which three fields must you specify?
When configuring a honeypot rule, which three fields must you specify? (Choose three.)