Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > Additional Online Exams > 500-285

500-285 Securing Cisco Networks with Sourcefire IPS Question and Answers

Question # 4

FireSIGHT recommendations appear in which layer of the Policy Layers page?

A.

Layer Summary

B.

User Layers

C.

Built-In Layers

D.

FireSIGHT recommendations do not show up as a layer.

Full Access
Question # 5

Which statement is true in regard to the Sourcefire Security Intelligence lists?

A.

The global blacklist universally allows all traffic through the managed device.

B.

The global whitelist cannot be edited.

C.

IP addresses can be added to the global blacklist by clicking on interactive graphs in Context Explorer.

D.

The Security Intelligence lists cannot be updated.

Full Access
Question # 6

Which option is one of the three methods of updating the IP addresses in Sourcefire Security Intelligence?

A.

subscribe to a URL intelligence feed

B.

subscribe to a VRT

C.

upload a list that you create

D.

automatically upload lists from a network share

Full Access
Question # 7

Which list identifies the possible types of alerts that the Sourcefire System can generate as notification of events or policy violations?

A.

logging to database, SMS, SMTP, and SNMP

B.

logging to database, SMTP, SNMP, and PCAP

C.

logging to database, SNMP, syslog, and email

D.

logging to database, PCAP, SMS, and SNMP

Full Access
Question # 8

Which option is a remediation module that comes with the Sourcefire System?

A.

Cisco IOS Null Route

B.

Syslog Route

C.

Nmap Route Scan

D.

Response Group

Full Access
Question # 9

Which option describes the two basic components of Sourcefire Snort rules?

A.

preprocessor configurations to define what to do with packets before the detection engine sees them, and detection engine configurations to define exactly how alerting is to take place

B.

a rule statement characterized by the message you configure to appear in the alert, and the rule body that contains all of the matching criteria such as source, destination, and protocol

C.

a rule header to define source, destination, and protocol, and the output configuration to determine which form of output to produce if the rule triggers

D.

a rule body that contains packet-matching criteria or options to define where to look for content in a packet, and a rule header to define matching criteria based on where a packet originates, where it is going, and over which protocol

Full Access