What information is provided by the host table (Choose three.)
What information is provided by the host table (Choose three.)
Which two does ESP use to help identify applications running on certain hosts?
Which two does ESP use to help identify applications running on certain hosts?
(Choose two.)
What is a Violation Object in ESP?
What is a Violation Object in ESP?
which three fields can ESP filter data?
On which three fields can ESP filter data? (Choose three.)
Which two actions should you take to accomplish this?
You want ESP to alert on abnormal activities in a network. Which two actions should you take to
accomplish this? (Choose two.)
Which three columns can be seen in the Application view of Profiler?
Which three columns can be seen in the Application view of Profiler? (Choose three.)
Which two statements about ESP are true?
Which two statements about ESP are true? (Choose two.)
Which statement is true about reverting Security Policies?
Which statement is true about reverting Security Policies?
Which statement is true about the Attack Object Update process?
Which statement is true about the Attack Object Update process?
Which command from the IDP Sensor CLI can be used to display the sensor statistics, the policy information, an
Which command from the IDP Sensor CLI can be used to display the sensor statistics, the policy
information, and mode of sensor deployment?