Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Setting a threshold on a sensor to react if traffic volume exceeds the threshold limit is an example of what specific detection method?

A.

Signature based

B.

DHCP based

C.

Pattern matching

D.

Denial of Service (DoS)

Full Access
Question # 5

How are packet logs viewed from within the Manager?

A.

Push the packet log to the Sensor and open it from there

B.

Packet logs cannot be viewed from within the Manager

C.

Save and export the Packet log in order to open it

D.

Set the log to be viewable with Wireshark/Ethereal

Full Access
Question # 6

Which mode needs to be set to redirect an unmanaged system to the guest portal?

A.

Audit

B.

Simulation

C.

Enforcement

D.

Prevention

Full Access
Question # 7

Which domains does a Super User have full rights to access?

A.

Super Users have full rights to all domains

B.

Super Users have full rights to only the domains in which they reside

C.

Super Users have full rights to only sensor configuration

D.

Super Users have full rights to only Parent domains

Full Access
Question # 8

What type of encryption is used for file transfers between the Sensor and the Manager?

A.

SSL with RC4

B.

SSL with MD5

C.

SSL with RC4 and MD5

D.

DES

Full Access
Question # 9

Which operating mode allows a sensor lo prevent attacks from reaching their intended targets?

A.

Tap

B.

Span

C.

In-line

D.

Failover

Full Access
Question # 10

Why would attacks not be blocked when the Sensor monitoring ports are configured in SPAN mode?

A.

Blocking of attacks only occurs when the Sensor is placed in In-line mode

B.

Blocking of attacks only occurs when the Sensor is placed in TAP mode

C.

The Sensor has not learned to identify these attacks

D.

Blocking of attacks only occurs when the Sensor has been configured for failover

Full Access
Question # 11

Why is the DBAdmin tool considered a preferred method of performing system maintenance tasks that could be performed within the Manager?

A.

Saves additional workload on the Manager

B.

Reliability

C.

Speed

D.

Ease of use

Full Access
Question # 12

Which of the following activities require a reboot of a sensor? (Choose three)

A.

Enabling/Disabling SSL

B.

Enabling/Disabling parsing and detection of attacks in IPv4 traffic

C.

Enabling/Disabling parsing and detection of attacks in IPv6 traffic

D.

Sensor software upgrade

E.

Signature update

Full Access
Question # 13

As a recommended best practice, what is the total number of sensors that should be managed through a single Network Security Manager installation?

A.

25

B.

50

C.

75

D.

100

Full Access