Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

500-285 Sample Questions Answers

Questions 4

Other than navigating to the Network File Trajectory page for a file, which option is an alternative way of accessing the network trajectory of a file?

Options:

A.

from Context Explorer

B.

from the Analysis menu

C.

from the cloud

D.

from the Defense Center

Buy Now
Questions 5

A one-to-many type of scan, in which an attacker uses a single host to scan a single port on multiple target hosts, indicates which port scan type?

Options:

A.

port scan

B.

portsweep

C.

decoy port scan

D.

ACK scan

Buy Now
Questions 6

Suppose an administrator is configuring an IPS policy and attempts to enable intrusion rules that require the operation of the TCP stream preprocessor, but the TCP stream preprocessor is turned off. Which statement is true in this situation?

Options:

A.

The administrator can save the IPS policy with the TCP stream preprocessor turned off, but the rules requiring its operation will not function properly.

B.

When the administrator enables the rules and then attempts to save the IPS policy, the administrator will be prompted to accept that the TCP stream preprocessor will be turned on for the IPS policy.

C.

The administrator will be prevented from changing the rule state of the rules that require the TCP stream preprocessor until the TCP stream preprocessor is enabled.

D.

When the administrator enables the rules and then attempts to save the IPS policy, the administrator will be prompted to accept that the rules that require the TCP stream preprocessor will be turned off for the IPS policy.

Buy Now
Questions 7

What does the whitelist attribute value "not evaluated" indicate?

Options:

A.

The host is not a target of the whitelist.

B.

The host could not be evaluated because no profile exists for it.

C.

The whitelist status could not be updated because the correlation policy it belongs to is not enabled.

D.

The host is not on a monitored network segment.

Buy Now
Questions 8

Which option is a remediation module that comes with the Sourcefire System?

Options:

A.

Cisco IOS Null Route

B.

Syslog Route

C.

Nmap Route Scan

D.

Response Group

Buy Now
Questions 9

Which statement regarding user exemptions is true?

Options:

A.

Non-administrators can be made exempt on an individual basis.

B.

Exempt users have a browser session timeout restriction of 24 hours.

C.

Administrators can be exempt from any browser session timeout value.

D.

By default, all users cannot be exempt from any browser session timeout value.

Buy Now
Questions 10

The collection of health modules and their settings is known as which option?

Options:

A.

appliance policy

B.

system policy

C.

correlation policy

D.

health policy

Buy Now
Questions 11

Alert priority is established in which way?

Options:

A.

event classification

B.

priority.conf file

C.

host criticality selection

D.

through Context Explorer

Buy Now
Questions 12

Which option describes the two basic components of Sourcefire Snort rules?

Options:

A.

preprocessor configurations to define what to do with packets before the detection engine sees them, and detection engine configurations to define exactly how alerting is to take place

B.

a rule statement characterized by the message you configure to appear in the alert, and the rule body that contains all of the matching criteria such as source, destination, and protocol

C.

a rule header to define source, destination, and protocol, and the output configuration to determine which form of output to produce if the rule triggers

D.

a rule body that contains packet-matching criteria or options to define where to look for content in a packet, and a rule header to define matching criteria based on where a packet originates, where it is going, and over which protocol

Buy Now
Questions 13

Which option is used to implement suppression in the Rule Management user interface?

Options:

A.

Rule Category

B.

Global

C.

Source

D.

Protocol

Buy Now
Questions 14

When you are editing an intrusion policy, how do you know that you have changes?

Options:

A.

The Commit Changes button is enabled.

B.

A system message notifies you.

C.

You are prompted to save your changes on every screen refresh.

D.

A yellow, triangular icon displays next to the Policy Information option in the navigation panel.

Buy Now
Questions 15

Which option is true of the Packet Information portion of the Packet View screen?

Options:

A.

provides a table view of events

B.

allows you to download a PCAP formatted file of the session that triggered the event

C.

displays packet data in a format based on TCP/IP layers

D.

shows you the user that triggered the event

Buy Now
Questions 16

Which option is not a characteristic of dashboard widgets or Context Explorer?

Options:

A.

Context Explorer is a tool used primarily by analysts looking for trends across varying periods of time.

B.

Context Explorer can be added as a widget to a dashboard.

C.

Widgets offer users an at-a-glance view of their environment.

D.

Widgets are offered to all users, whereas Context Explorer is limited to a few roles.

Buy Now
Questions 17

Which statement is true in regard to the Sourcefire Security Intelligence lists?

Options:

A.

The global blacklist universally allows all traffic through the managed device.

B.

The global whitelist cannot be edited.

C.

IP addresses can be added to the global blacklist by clicking on interactive graphs in Context Explorer.

D.

The Security Intelligence lists cannot be updated.

Buy Now
Questions 18

Which option is true regarding the $HOME_NET variable?

Options:

A.

is a policy-level variable

B.

has a default value of "all"

C.

defines the network the active policy protects

D.

is used by all rules to define the internal network

Buy Now
Exam Code: 500-285
Exam Name: Securing Cisco Networks with Sourcefire IPS
Last Update: Nov 20, 2024
Questions: 60
$68  $169.99
$52  $129.99
$44  $109.99
buy now 500-285