Download Securing Cisco Networks with Sourcefire Intrusion Prevention System.500-285.SelfTestEngine.2017-11-18.53q.vcex

Vendor: Cisco
Exam Code: 500-285
Exam Name: Securing Cisco Networks with Sourcefire Intrusion Prevention System
Date: Nov 18, 2017
File Size: 23 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
What are the two categories of variables that you can configure in Object Management?
  1. System Default Variables and FireSIGHT-Specific Variables
  2. System Default Variables and Procedural Variables
  3. Default Variables and Custom Variables
  4. Policy-Specific Variables and Procedural Variables
Correct answer: C
Question 2
Which option is true regarding the $HOME_NET variable?
  1. is a policy-level variable
  2. has a default value of "all"
  3. defines the network the active policy protects
  4. is used by all rules to define the internal network
Correct answer: C
Question 3
Which option is one of the three methods of updating the IP addresses in Sourcefire Security Intelligence?
  1. subscribe to a URL intelligence feed
  2. subscribe to a VRT
  3. upload a list that you create
  4. automatically upload lists from a network share
Correct answer: C
Question 4
Which statement is true in regard to the Sourcefire Security Intelligence lists?
  1. The global blacklist universally allows all traffic through the managed device.
  2. The global whitelist cannot be edited.
  3. IP addresses can be added to the global blacklist by clicking on interactive graphs in Context Explorer.
  4. The Security Intelligence lists cannot be updated.
Correct answer: C
Question 5
How do you configure URL filtering?
  1. Add blocked URLs to the global blacklist.
  2. Create a Security Intelligence object that contains the blocked URLs and add the object to the access control policy.
  3. Create an access control rule and, on the URLs tab, select the URLs or URL categories that are to be blocked or allowed.
  4. Create a variable.
Correct answer: C
Question 6
When adding source and destination ports in the Ports tab of the access control policy rule editor, which restriction is in place?
  1. The protocol is restricted to TCP only.
  2. The protocol is restricted to UDP only.
  3. The protocol is restricted to TCP or UDP.
  4. The protocol is restricted to TCP and UDP.
Correct answer: C
Question 7
Access control policy rules can be configured to block based on the conditions that you specify in each rule. Which behavior block response do you use if you want to deny and reset the connection of HTTP traffic that meets the conditions of the access control rule?
  1. interactive block with reset
  2. interactive block
  3. block
  4. block with reset
Correct answer: D
Question 8
Which option transmits policy-based alerts such as SNMP and syslog?
  1. the Defense Center
  2. FireSIGHT
  3. the managed device
  4. the host
Correct answer: C
Question 9
When you are editing an intrusion policy, how do you know that you have changes?
  1. The Commit Changes button is enabled.
  2. A system message notifies you.
  3. You are prompted to save your changes on every screen refresh.
  4. A yellow, triangular icon displays next to the Policy Information option in the navigation panel.
Correct answer: D
Question 10
FireSIGHT recommendations appear in which layer of the Policy Layers page?
  1. Layer Summary
  2. User Layers
  3. Built-In Layers
  4. FireSIGHT recommendations do not show up as a layer.
Correct answer: C

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!