What are two examples of traditional host-based security measures? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two examples of traditional host-based security measures? (Choose two.) NAS 802.1X host-based IPS host-based NAC antimalware software Answers Explanation & Hints: Traditional host-based security measures include antivirus/antimalware software,…

Continue ReadingWhat are two examples of traditional host-based security measures? (Choose two.)

What two internal LAN elements need to be secured? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What two internal LAN elements need to be secured? (Choose two.) switches IP phones edge routers fiber connections cloud-based hosts Answers Explanation & Hints: Internal network protection is just as…

Continue ReadingWhat two internal LAN elements need to be secured? (Choose two.)

Why are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Why are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices? These devices are not managed by the corporate IT department. These devices are more varied…

Continue ReadingWhy are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices?

What type of data does the DLP feature of Cisco Email Security Appliance scan in order to prevent customer data from being leaked outside of the company?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of data does the DLP feature of Cisco Email Security Appliance scan in order to prevent customer data from being leaked outside of the company? inbound messages outbound…

Continue ReadingWhat type of data does the DLP feature of Cisco Email Security Appliance scan in order to prevent customer data from being leaked outside of the company?

What is a characteristic of the connectivity policy setting when configuring Snort threat protection?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a characteristic of the connectivity policy setting when configuring Snort threat protection? it prioritizes security over connectivity it enables the highest number of signatures to be verified it…

Continue ReadingWhat is a characteristic of the connectivity policy setting when configuring Snort threat protection?

What is a characteristic of the Community Rule Set type of Snort term-based subscriptions?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a characteristic of the Community Rule Set type of Snort term-based subscriptions? it is fully supported by Cisco it has 60-day delayed access to updated signatures it is…

Continue ReadingWhat is a characteristic of the Community Rule Set type of Snort term-based subscriptions?

Which IPS signature trigger category uses a decoy server to divert attacks away from production devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which IPS signature trigger category uses a decoy server to divert attacks away from production devices? pattern-based detection anomaly-based detection honey pot-based detection policy-based detection Answers Explanation & Hints: Honey…

Continue ReadingWhich IPS signature trigger category uses a decoy server to divert attacks away from production devices?

What are two actions that an IPS can perform whenever a signature detects the activity for which it is configured? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two actions that an IPS can perform whenever a signature detects the activity for which it is configured? (Choose two.) allow the activity disable the link reconverge the…

Continue ReadingWhat are two actions that an IPS can perform whenever a signature detects the activity for which it is configured? (Choose two.)

What information must an IPS track in order to detect attacks matching a composite signature?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What information must an IPS track in order to detect attacks matching a composite signature? the total number of packets in the attack the state of packets related to the…

Continue ReadingWhat information must an IPS track in order to detect attacks matching a composite signature?

What is PulledPork?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is PulledPork? a rule management application that can be used to automatically download Snort rule updates a centralized management tool to push the rule sets based on preconfigured policy,…

Continue ReadingWhat is PulledPork?

What is a minimum system requirement to activate Snort IPS functionality on a Cisco router?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a minimum system requirement to activate Snort IPS functionality on a Cisco router? ISR 2900 or higher at least 4 GB RAM at least 4 GB flash K9…

Continue ReadingWhat is a minimum system requirement to activate Snort IPS functionality on a Cisco router?

Which Snort IPS feature enables a router to download rule sets directly from cisco.com or snort.org?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Snort IPS feature enables a router to download rule sets directly from cisco.com or snort.org? Signature allowed listing Snort rule set updates Snort rule set pull Snort rule set…

Continue ReadingWhich Snort IPS feature enables a router to download rule sets directly from cisco.com or snort.org?

Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks? Snort Nmap Netflow SIEM Answers Explanation & Hints: Snort is…

Continue ReadingWhich tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

What are two characteristics of an IPS operating in promiscuous mode? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two characteristics of an IPS operating in promiscuous mode? (Choose two.) It can stop malicious traffic from reaching the intended target for all types of attacks. It does…

Continue ReadingWhat are two characteristics of an IPS operating in promiscuous mode? (Choose two.)