What type of encryption is used for file transfers between the Sensor and the Manager?
A. SSL with RC4
B. SSL with MD5
C. SSL with RC4 and MD5
D. DES
DoS detection is implemented in which of the following modes? (Choose two)
A. Learning mode
B. Configuration mode
C. Threshold mode
D. Bidirectional mode
E. Inbound mode
Which command is used to manually download signature tiles from the tftpserver when connectivity to the Manager is not available?
A. Loadimage WORD
B. Loadconfig WORD
C. Loadconfiguration WORD
D. Loadsigset WORD
Which of the following deployment modes receives a copy of the packet from a mirrored switch port?
A. Redundant
B. SPAN
C. TAP
D. In-line
Policies can be configured to drop packets when which of the following has been defined?
A. The policy has been enabled
B. The underlying rule set permits dropped packets
C. The sensor is deployed in Inline mode
D. The policy has been cloned
Which CLI command is used to determine that the Sensor has established trust with the Manager?
A. config
B. status
C. trust
D. show
What is the command to enable the sensor to forward all traffic at Layer 2 if a failure occurs?
A. Layer2 mode off
B. Layer2modeon
C. Layer2 mode assert
D. Layer2 mode deassert
Setting a threshold limit in order for the IPS to react if traffic volume exceeds this limit is an example of which type of detection method?
A. Statistical anomaly
B. Protocol anomaly
C. Pattern matching
D. Application anomaly
A Reconnaissance Policy can be applied to which of the following?
A. Sensors
B. Sensor Ports
C. Sensors and sensor ports
D. Specific Hosts
_____________________are a set of Access Control List (ACL) rules that define network access provided to a host, subject to Network Access Control.
A. Network Access Lists
B. Network Access Objects
C. Network Access Zones
D. Network Access Policy