IT자격증을 많이 취득하여 IT업계에서 자신만의 단단한 자리를 보장하는것이 여러분들의 로망이 아닐가 싶습니다. Pass4Test의 완벽한 Cisco 500-285 (Securing Cisco Networks with Sourcefire IPS) 덤프는 IT전문가들이 자신만의 노하우와 경험으로 실제 Cisco 500-285 (Securing Cisco Networks with Sourcefire IPS) 시험문제에 대비하여 연구제작한 완벽한 작품으로서 100%시험통과율을 보장합니다.
NO.1 Which option transmits policy-based alerts such as SNMP and syslog?
A.
the Defense Center
B. FireSIGHT
C. the managed device
D. the
host
Answer: C
NO.2 Correlation policy rules allow you to construct
criteria for alerting on very specific conditions.
Which option is an example
of such a rule?
A. testing password strength when accessing an
application
B. limiting general user access to administrative file
shares
C. enforcing two-factor authentication for access to critical
servers
D. issuing an alert if a noncompliant operating system is detected or
if a host operating system
changes to a noncompliant operating system when it
was previously profiled as a compliant one
Answer: D
NO.3 Remote
access to the Defense Center database has which characteristic?
A.
read/write
B. read-only
C. Postgres
D. Estreamer
Answer:
B
NO.4 Which statement is true concerning static NAT?
A. Static NAT
supports only TCP traffic.
B. Static NAT is normally deployed for outbound
traffic only.
C. Static NAT provides a one-to-one mapping between IP
addresses.
D. Static NAT provides a many-to-one mapping between IP
addresses.
Answer: C
NO.5 When configuring an LDAP authentication
object, which server type is available?
A. Microsoft Active Directory
B.
Yahoo
C. Oracle
D. SMTP
Answer: A
NO.6 Stacking allows a primary
device to utilize which resources of secondary devices?
A. interfaces, CPUs,
and memory
B. CPUs and memory
C. interfaces, CPUs, memory, and
storage
D. interfaces and storage
Answer: B
A.
the Defense Center
B. FireSIGHT
C. the managed device
D. the
host
Answer: C
NO.2 Correlation policy rules allow you to construct
criteria for alerting on very specific conditions.
Which option is an example
of such a rule?
A. testing password strength when accessing an
application
B. limiting general user access to administrative file
shares
C. enforcing two-factor authentication for access to critical
servers
D. issuing an alert if a noncompliant operating system is detected or
if a host operating system
changes to a noncompliant operating system when it
was previously profiled as a compliant one
Answer: D
NO.3 Remote
access to the Defense Center database has which characteristic?
A.
read/write
B. read-only
C. Postgres
D. Estreamer
Answer:
B
NO.4 Which statement is true concerning static NAT?
A. Static NAT
supports only TCP traffic.
B. Static NAT is normally deployed for outbound
traffic only.
C. Static NAT provides a one-to-one mapping between IP
addresses.
D. Static NAT provides a many-to-one mapping between IP
addresses.
Answer: C
NO.5 When configuring an LDAP authentication
object, which server type is available?
A. Microsoft Active Directory
B.
Yahoo
C. Oracle
D. SMTP
Answer: A
NO.6 Stacking allows a primary
device to utilize which resources of secondary devices?
A. interfaces, CPUs,
and memory
B. CPUs and memory
C. interfaces, CPUs, memory, and
storage
D. interfaces and storage
Answer: B