which of the following methods to cable the heartbeat connection of a sensor failover pair?
McAfee recommends which of the following methods to cable the heartbeat connection of a
sensor failover pair?
Which option will you use to verify whether the issue is due to sensor configuration or network congestion?
A sensor is placed in-line and is dropping traffic. This situation demands an immediate
removal of the sensor from the network to let traffic flow uninterrupted. Which option will you
use to verify whether the issue is due to sensor configuration or network congestion?
which type of detection method?
Setting a threshold limit in order for the IPS to react if traffic volume exceeds this limit is an
example of which type of detection method?
Which sensor action allows the detection and dropping of attacks in real-time?
Which sensor action allows the detection and dropping of attacks in real-time?
which of the following?
A Reconnaissance Policy can be applied to which of the following?
Which NSP sensor models support SSL encryption?
Which NSP sensor models support SSL encryption? (Choose three)
Which is the correct syntax for the ‘set dosprevenbonseverity’ command?
Which is the correct syntax for the ‘set dosprevenbonseverity’ command?
_____________________are a set of Access Control List (ACL) rules that define network access provided to a h
_____________________are a set of Access Control List (ACL) rules that define network
access provided to a host, subject to Network Access Control.
Which command allows an off-line signature file download from a tftp server when connectivity to the Manager i
Which command allows an off-line signature file download from a tftp server when
connectivity to the Manager is unavailable?
Which of the following are the methods used by NSP to recognize and react to Denial-ofService (DoS) attacks?
Which of the following are the methods used by NSP to recognize and react to Denial-ofService (DoS) attacks? (Choose three)