Q1. To correlate known vulnerabilities to devices that are currently exposed to such vulnerabilities, which of the following must be selected on the Receiver?
A.Auto Download VulnEvents
B. Enable Vulnerability Event Correlation
C. Generate Vulnerability Events
D. Enable VA Source
Correct Answer: D
Q2. A security administrator is configuring the Enterprise Security Manager (ESM) to comply with corporate security policy and wishes to restrict access to the ESM to certain users and machines Which of the following actions would accomplish this?
A.Configure the Access Control List and setup user accounts
B. Define user groups and set permissions based on IP
C. Assign AD users to computer assignment groups
D. Setup local accounts based on IP Zones
Correct Answer: A
Q3. With regard to Data Source configuration and event collection what does the acronym CEF stand for?
A.Correlation Event Framing
B. Common Event Format
C. Common Event Framing
D. Condition Event Format
Correct Answer: B
Q4. The primary function of the Application Data Monitor (ADM) appliance is to decode traffic at layer
A.one for inspection.
B. three for inspection.
C. five for inspection.
D. seven for inspection.
Correct Answer: D
$ 39
Reviews
There are no reviews yet.