What would best mitigate the executable-code exploits that can perform a variety of malicious acts, such as er
What would best mitigate the executable-code exploits that can perform a variety of malicious
acts, such as erasing your hard drive?
What is the purpose of an interface pair?
What is the purpose of an interface pair?
Which two protocols can be used for automatic signature and service pack updates?
Which two protocols can be used for automatic signature and service pack updates? (Choose
two.)
What are three differences between inline and promiscuous sensor functionality?
What are three differences between inline and promiscuous sensor functionality? (Choose three.)
What is a configurable weight that is associated with the perceived importance of a network asset?
What is a configurable weight that is associated with the perceived importance of a network asset?
How would you copy packets that have been captured from the data interfaces to a location off the Cisco IDS or
How would you copy packets that have been captured from the data interfaces to a location off the
Cisco IDS or IPS sensor?
Which action is available only to signatures supported by the Normalizer engine
Which action is available only to signatures supported by the Normalizer engine
How is automatic IP logging enabled on a sensor?
How is automatic IP logging enabled on a sensor?
How can you configure your sensor to identify and stop this activity?
You think users on your corporate network are disguising the use of file-sharing applications by
tunneling the traffic through port 80. How can you configure your sensor to identify and stop this
activity?
Which action should you assign to the signature?
When signature 3116 (NetBus) fires, you want your sensor to terminate the current packet and
future packets on the TCP flow. Which action should you assign to the signature?