Which action enables the Cisco Security MARS appliance to ignore false-positive events by either dropping the
Which action enables the Cisco Security MARS appliance to ignore false-positive events by either dropping the events completely, or by just logging them to the database?
What is the definition of a strong password?
John the security administrator at Certkiller Inc. is working on securing the network with strong passwords. What is the definition of a strong password?
What are three ways to add devices to the Cisco Security MARS appliance?
What are three ways to add devices to the Cisco Security MARS appliance? (Choose three.)
Which two general IP spoofing techniques does a hacker use?
You are the security administrator at Certkiller and you need to know the attacks types to the network. Which two general IP spoofing techniques does a hacker use? (Choose two)
Which additional Cisco Security MARS configuration will be required to correct this issue?
A Cisco Security MARS appliance cannot access certain devices through the default gateway. Troubleshooting has determined that this is a Cisco Security MARS configuration issue. Which additional Cisco Security MARS configuration will be required to correct this issue?
What type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed t
The security team at Certkiller Inc. is working on understanding attacks that happen in the network. What type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed through a firewall, and can never be completely eliminated?
What is a benefit of using the dollar variable (as in $TARGET01) when creating queries in Cisco Security MARS?
What is a benefit of using the dollar variable (as in $TARGET01) when creating queries in Cisco Security MARS?
Which type of attack can be mitigated only through encryption?
Which type of attack can be mitigated only through encryption?
which protocol for data archiving and restoring?
The Cisco Security MARS appliance supports which protocol for data archiving and restoring?
What is an example of a trust model?
The security team at Certkiller Inc. is working on network security design.
What is an example of a trust model?