What Event Action in an IPS signature is used to stop an attacker from communicating with a network using an a
What Event Action in an IPS signature is used to stop an attacker from communicating with a
network using an access-list?
what is the default IP range of the external zone?
Within Cisco IPS anomaly detection, what is the default IP range of the external zone?
Which two Cisco IPS events will generate an IP log?
Which two Cisco IPS events will generate an IP log? (Choose two.)
Which three options are valid event actions for a Cisco IPS?
Which three options are valid event actions for a Cisco IPS? (Choose three.)
Which configuration option causes an ASA with IPS module to drop traffic matching IPS signatures and to block
Which configuration option causes an ASA with IPS module to drop traffic matching IPS
signatures and to block all traffic if the module fails?
Which Cisco IPS CLI command shows the most fired signature?
Which Cisco IPS CLI command shows the most fired signature?
Which IPS engine detects ARP spoofing?
Which IPS engine detects ARP spoofing?
Which two options are characteristics of router-based IPS?
Which two options are characteristics of router-based IPS? (Choose two.)
What is the access-list command on a Cisco IPS appliance used for?
What is the access-list command on a Cisco IPS appliance used for?
How does a user access a Cisco Web Security Appliance for initial setup?
How does a user access a Cisco Web Security Appliance for initial setup?