Q1. Which option is derived from the discovery component of FireSIGHT technology?
A.connection event table view
B. network profile
C. host profile
D. authentication objects
Correct Answer: C
Q2. Which statement is true when network traffic meets the criteria specified in a correlation rule?
A.Nothing happens, because you cannot assign a group of rules to a correlation policy.
B. The network traffic is blocked.
C. The Defense Center generates a correlation event and initiates any configured responses.
D. An event is logged to the Correlation Policy Management table.
Correct Answer: C
Q3. Which option describes the two basic components of Sourcefire Snort rules?
A.preprocessor configurations to define what to do with packets before the detection engine sees them, and detection engine configurations to define exactly how alerting is to take place
B. a rule statement characterized by the message you configure to appear in the alert, and the rule body that contains all of the matching criteria such as source, destination, and protocol
C. a rule header to define source, destination, and protocol, and the output configuration to determine which form of output to produce if the rule triggers
D. a rule body that contains packet-matching criteria or options to define where to look for content in a packet, and a rule header to define matching criteria based on where a packet originates, where it is going, and over which protocol
Correct Answer: D
Q4. Which option is a valid whitelist evaluation value?
A.pending
B. violation
C. semi-compliant
D. not-evaluated
Correct Answer: D
$ 39
Reviews
There are no reviews yet.