Deck 2: Certified McAfee Security Specialist - NSP

Full screen (f)
exit full mode
Question
Which CLI command is used to copy sensor SSL certificates from external flash when replacing a failed sensor?

A) Exportsensorcerts
B) Importsensorcerts
C) Exportcerts
D) Importcerts
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following deployment modes receives a copy of the packet from a mirrored switch port?

A) Redundant
B) SPAN
C) TAP
D) In-line
Question
If the Health level of a Host cannot be determined. McAfee NAC assigns which of the following System Health levels to that Host?

A) Fair
B) Poor
C) Serious
D) Unknown
Question
Which attack cannot be blocked when the sensor has been set for in-line mode?

A) TCP Control Anomaly
B) ICMP Echo Anomaly
C) Too Many Inbound Syn
D) SCADA Attacks
Question
Setting a threshold on a sensor to react if traffic volume exceeds the threshold limit is an example of what specific detection method?

A) Signature based
B) DHCP based
C) Pattern matching
D) Denial of Service (DoS)
Question
When the buffer on the alert cache has been filled, what happens to current incoming alerts?

A) Incoming alerts are added to the cache and the oldest alerts are dropped
B) Incoming alerts are not added to the cache and are dropped
C) Incoming alerts are held in queue until cache space is cleared
D) Incoming alerts are added to the database directly
Question
Policies can be configured to drop packets when which of the following has been defined?

A) The policy has been enabled
B) The underlying rule set permits dropped packets
C) The sensor is deployed in Inline mode
D) The policy has been cloned
Question
The Network Security Manager provides the following built-in Network Access Zones. (Choose three)

A) Allow DNS Access
B) Allow Full Access
C) Public Network Only
D) Allow DHCP Access
E) Allow Intranet Access
Question
Which policy is assigned to a child domain by default?

A) The default IDS policy
B) The default IPS policy
C) No default policy
D) The policy of the parent domain
Question
Reconnaissance Policies can be applied to which of the following sensor nodes?

A) Sensor name node only
B) Sensor interface node only
C) Sensor sub-interface node only
D) Sensor name, interface and sub-interface node
Question
Which mode needs to be set to redirect an unmanaged system to the guest portal?

A) Audit
B) Simulation
C) Enforcement
D) Prevention
Question
Which of the following modes can be used to implement DoS detection? (Choose two)

A) Learning Mode
B) Threshold Mode
C) Configuration Mode
D) Adaptive Mode
E) Transition Mode
Question
Which database is supported for Network Security Manager?

A) MSSQL
B) Oracle
C) MySQL
D) Sybase
Question
Which of the following deployment modes is not included in standard NAC?

A) System Health based NAC
B) DHCP based NAC
C) L2 based NAC
D) L3 based NAC
Question
Which logs are used to determine who was logged into the Manager the last time a signature set update was pushed from the Manager to the Sensor?

A) Trace log
B) Fault log
C) Manager ems log
D) User Activity Audit log
Question
Which of the following methods are available for upgrading a Sensor image?

A) TFTP and/or through the Manager
B) PUTTY and/or through the Manager
C) Console connection and/or through the Manager
D) TFTP, console connection and/or through the Manager
Question
Which command is used to manually download signature tiles from the tftpserver when connectivity to the Manager is not available?

A) Loadimage WORD
B) Loadconfig WORD
C) Loadconfiguration WORD
D) Loadsigset WORD
Question
Which of the following is the correct extension for a Sensor image imported into the Manager?

A) ext
B) .opt
C) jar
D) .mfe
Question
A sensor will redirect the host to which of the following when McAfee NAC reports the Host status as "unmanaged with an Unknown Health Level"?

A) Guest Client Portal
B) NAC Client Portal
C) Sensor Client Portal
D) DNS Server Portal
Question
Which of the following are considered part of the Operational mode of System Health-based NAC? (Choose three)

A) Audit
B) IPS
C) TAP
D) Simulation
E) Enforcement
F) SPAN
Question
Which command can be issued on a Sensor to check the health of the Sensor?

A) show
B) show settings
C) status
D) check health
Question
Which port needs to be opened for install Channel communication between Sensor and Manager through a firewall?

A) 8501
B) 8502
C) 8503
D) 8555
Question
Which CLI command is used to determine that the Sensor has established trust with the Manager?

A) config
B) status
C) trust
D) show
Question
Which is the correct syntax for the 'set dosprevenbonseverity' command?

A) Set dospreventionseveriry tcp-rst 150
B) Set dospreventionseverity icmp-echo-reply enable 150
C) Set dospreventionseverity tcp-syn inbound 150
D) Set dosprevenbonseverity ip-fragment inbound
Question
How are packet logs viewed from within the Manager?

A) Push the packet log to the Sensor and open it from there
B) Packet logs cannot be viewed from within the Manager
C) Save and export the Packet log in order to open it
D) Set the log to be viewable with Wireshark/Ethereal
Question
Which NSP sensor models support SSL encryption? (Choose three)

A) M-4050
B) M-1450
C) M-2750
D) M-1250
E) M-6050
Question
McAfee recommends which of the following methods to cable the heartbeat connection of a sensor failover pair?

A) direct fiber connection with specified monitoring ports
B) direct copper connection using response ports
C) switched fiber connection
D) direct copper connection using failopen port
Question
A sensor is placed in-line and is dropping traffic. This situation demands an immediate removal of the sensor from the network to let traffic flow uninterrupted. Which option will you use to verify whether the issue is due to sensor configuration or network congestion?

A) Layer2modeon
B) Layer2 mode assert
C) Layer2 mode deassert
D) Layer2 mode off
Question
Why is the DBAdmin tool considered a preferred method of performing system maintenance tasks that could be performed within the Manager?

A) Saves additional workload on the Manager
B) Reliability
C) Speed
D) Ease of use
Question
Which sensor action detects and drop attacks in real-time?

A) Drop further packets
B) Host Quarantine action
C) TCP reset
D) ICMP host unreachable
Question
Malware Protection requires which of the following feature or features to be enabled?

A) HTTP response scanning
B) Attack Filters
C) Performance Monitoring
D) The "Default Inline IPS" policy
Question
A Sensor allows the option of Layer2 forwarding for which of the following?

A) TCP and UDP ports only
B) UDP ports and VLAN interfaces only
C) TCP ports and VLAN interfaces only
D) TCP ports, UDP ports and VLAN interfaces
Question
A Reconnaissance Policy can be applied to which of the following?

A) Sensors
B) Sensor Ports
C) Sensors and sensor ports
D) Specific Hosts
Question
Which of the following commands will reestablish the Alert and packet log channel connection between the sensor and manager?

A) Connectalertandpktlogchannels
B) Disconnectalertandptologchannels
C) reconnectalertandpktlogchannets
D) deinstall
Question
Which sensor action allows the detection and dropping of attacks in real-time?

A) Host Quarantine action
B) ICMP Host unreachable
C) TCP reset
D) Drop further packets
Question
Which of the following actions can a Standby Manager of an MDR pair perform?

A) Modify sensor configuration
B) Policy configuration
C) Signature update
D) Configuration backup
Question
________________allows a host to be subjected to both DHCP based NAC and Identity Based Access Control when configured on different ports.

A) Integrated NAC
B) DHCP based NAC
C) Hybrid NAC
D) Health based NAC
Question
Which of the following is the proper step to take if an IP address change is made to the server where the Network Security Manager has been installed?

A) Change the IP address in the Network Security Manager settings
B) Change the IP address through a command-line statement
C) Reinstall the Network Security Manager
D) The IP address can never be changed on the Network Security Manager
Question
Which operating mode allows a sensor lo prevent attacks from reaching their intended targets?

A) Tap
B) Span
C) In-line
D) Failover
Question
When creating policies, which of the following rule sets are available for selection within those policies?

A) Only rule sets created using the Rule Set Editor
B) Only rule sets imported from the Sensor
C) Only rule sets created using the Rule Set Editor and Default rule sets
D) Only Default Rule sets
Question
_____________________are a set of Access Control List (ACL) rules that define network access provided to a host, subject to Network Access Control.

A) Network Access Lists
B) Network Access Objects
C) Network Access Zones
D) Network Access Policy
Question
What type of encryption is used for alert channel (control channel) communication between the Sensor and the Manager?

A) SSL with RC4
B) SSL with MD5
C) SSL with RC4 and MD5
D) DES
Question
Which of the following options is the best practice to use if you need to edit all attacks with a specific seventy number within an IPS policy?

A) Use the Bulk Edit feature within the Policy Editor
B) Create and run the appropriate database query
C) Edit the attacks individually
D) Use the Bulk Edit feature within the Reconnaissance Editor
Question
If the Health Level of the host cannot be determined, which of the following System Health Levels would be assigned?

A) Fair
B) Poor
C) Serious
D) Unknown
Question
By default, sensors are configured to operate in which operating mode?

A) In-line
B) Tap
C) SPAN
D) Failover
Question
When McAfee NAC reports the host status as unmanaged with an Unknown Hearth Level, the sensor redirects the host to which of the following?

A) Guest Client Portal
B) NAC Client Portal
C) Sensor Client Portal
D) DNS Server Portal
Question
Which of the following activities require a reboot of a sensor? (Choose three)

A) Enabling/Disabling SSL
B) Enabling/Disabling parsing and detection of attacks in IPv4 traffic
C) Enabling/Disabling parsing and detection of attacks in IPv6 traffic
D) Sensor software upgrade
E) Signature update
Question
Which of the following are the methods used by NSP to recognize and react to Denial-of-Service (DoS) attacks? (Choose three)

A) Blocking
B) Shutting down the sensor
C) Thresholds
D) Self-learning
E) Logging
F) DDoS attack tool with exploit signatures
Question
Which domains does a Super User have full rights to access?

A) Super Users have full rights to all domains
B) Super Users have full rights to only the domains in which they reside
C) Super Users have full rights to only sensor configuration
D) Super Users have full rights to only Parent domains
Question
Which of the following CLI commands will not cause an automatic reboot of the Sensor?

A) resetconfig
B) delete signatures
C) factorydefaults
D) deinstall
Question
Which of the following cannot be configured at the sub-interface level?

A) DoS Learning Mode
B) Assigned Policy
C) Attack Filters
D) Interface type
Question
In double VLAN tagging, the second VLAN tag inserted into the frame is called the:

A) Customer Identification tag (CD)
B) VLAN Identifier tag (VID)
C) Outer Identifier tag (OID)
D) Inner Identifier tad (ID)
Question
In L3 mode, a sensor detects an L2 device based on which address?

A) MAC
B) IP
C) Default Gateway
D) DNS
Question
Where in the Network Security Manager console can you see a hierarchical view of all the installed applications currently deployed and the resources associated with each?

A) Device List
B) Resource Tree
C) Details Pane
D) System Links
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/54
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Certified McAfee Security Specialist - NSP
1
Which CLI command is used to copy sensor SSL certificates from external flash when replacing a failed sensor?

A) Exportsensorcerts
B) Importsensorcerts
C) Exportcerts
D) Importcerts
Importsensorcerts
2
Which of the following deployment modes receives a copy of the packet from a mirrored switch port?

A) Redundant
B) SPAN
C) TAP
D) In-line
SPAN
3
If the Health level of a Host cannot be determined. McAfee NAC assigns which of the following System Health levels to that Host?

A) Fair
B) Poor
C) Serious
D) Unknown
Unknown
4
Which attack cannot be blocked when the sensor has been set for in-line mode?

A) TCP Control Anomaly
B) ICMP Echo Anomaly
C) Too Many Inbound Syn
D) SCADA Attacks
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
5
Setting a threshold on a sensor to react if traffic volume exceeds the threshold limit is an example of what specific detection method?

A) Signature based
B) DHCP based
C) Pattern matching
D) Denial of Service (DoS)
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
6
When the buffer on the alert cache has been filled, what happens to current incoming alerts?

A) Incoming alerts are added to the cache and the oldest alerts are dropped
B) Incoming alerts are not added to the cache and are dropped
C) Incoming alerts are held in queue until cache space is cleared
D) Incoming alerts are added to the database directly
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
7
Policies can be configured to drop packets when which of the following has been defined?

A) The policy has been enabled
B) The underlying rule set permits dropped packets
C) The sensor is deployed in Inline mode
D) The policy has been cloned
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
8
The Network Security Manager provides the following built-in Network Access Zones. (Choose three)

A) Allow DNS Access
B) Allow Full Access
C) Public Network Only
D) Allow DHCP Access
E) Allow Intranet Access
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
9
Which policy is assigned to a child domain by default?

A) The default IDS policy
B) The default IPS policy
C) No default policy
D) The policy of the parent domain
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
10
Reconnaissance Policies can be applied to which of the following sensor nodes?

A) Sensor name node only
B) Sensor interface node only
C) Sensor sub-interface node only
D) Sensor name, interface and sub-interface node
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
11
Which mode needs to be set to redirect an unmanaged system to the guest portal?

A) Audit
B) Simulation
C) Enforcement
D) Prevention
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following modes can be used to implement DoS detection? (Choose two)

A) Learning Mode
B) Threshold Mode
C) Configuration Mode
D) Adaptive Mode
E) Transition Mode
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
13
Which database is supported for Network Security Manager?

A) MSSQL
B) Oracle
C) MySQL
D) Sybase
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following deployment modes is not included in standard NAC?

A) System Health based NAC
B) DHCP based NAC
C) L2 based NAC
D) L3 based NAC
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
15
Which logs are used to determine who was logged into the Manager the last time a signature set update was pushed from the Manager to the Sensor?

A) Trace log
B) Fault log
C) Manager ems log
D) User Activity Audit log
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following methods are available for upgrading a Sensor image?

A) TFTP and/or through the Manager
B) PUTTY and/or through the Manager
C) Console connection and/or through the Manager
D) TFTP, console connection and/or through the Manager
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
17
Which command is used to manually download signature tiles from the tftpserver when connectivity to the Manager is not available?

A) Loadimage WORD
B) Loadconfig WORD
C) Loadconfiguration WORD
D) Loadsigset WORD
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is the correct extension for a Sensor image imported into the Manager?

A) ext
B) .opt
C) jar
D) .mfe
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
19
A sensor will redirect the host to which of the following when McAfee NAC reports the Host status as "unmanaged with an Unknown Health Level"?

A) Guest Client Portal
B) NAC Client Portal
C) Sensor Client Portal
D) DNS Server Portal
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following are considered part of the Operational mode of System Health-based NAC? (Choose three)

A) Audit
B) IPS
C) TAP
D) Simulation
E) Enforcement
F) SPAN
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
21
Which command can be issued on a Sensor to check the health of the Sensor?

A) show
B) show settings
C) status
D) check health
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
22
Which port needs to be opened for install Channel communication between Sensor and Manager through a firewall?

A) 8501
B) 8502
C) 8503
D) 8555
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
23
Which CLI command is used to determine that the Sensor has established trust with the Manager?

A) config
B) status
C) trust
D) show
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
24
Which is the correct syntax for the 'set dosprevenbonseverity' command?

A) Set dospreventionseveriry tcp-rst 150
B) Set dospreventionseverity icmp-echo-reply enable 150
C) Set dospreventionseverity tcp-syn inbound 150
D) Set dosprevenbonseverity ip-fragment inbound
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
25
How are packet logs viewed from within the Manager?

A) Push the packet log to the Sensor and open it from there
B) Packet logs cannot be viewed from within the Manager
C) Save and export the Packet log in order to open it
D) Set the log to be viewable with Wireshark/Ethereal
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
26
Which NSP sensor models support SSL encryption? (Choose three)

A) M-4050
B) M-1450
C) M-2750
D) M-1250
E) M-6050
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
27
McAfee recommends which of the following methods to cable the heartbeat connection of a sensor failover pair?

A) direct fiber connection with specified monitoring ports
B) direct copper connection using response ports
C) switched fiber connection
D) direct copper connection using failopen port
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
28
A sensor is placed in-line and is dropping traffic. This situation demands an immediate removal of the sensor from the network to let traffic flow uninterrupted. Which option will you use to verify whether the issue is due to sensor configuration or network congestion?

A) Layer2modeon
B) Layer2 mode assert
C) Layer2 mode deassert
D) Layer2 mode off
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
29
Why is the DBAdmin tool considered a preferred method of performing system maintenance tasks that could be performed within the Manager?

A) Saves additional workload on the Manager
B) Reliability
C) Speed
D) Ease of use
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
30
Which sensor action detects and drop attacks in real-time?

A) Drop further packets
B) Host Quarantine action
C) TCP reset
D) ICMP host unreachable
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
31
Malware Protection requires which of the following feature or features to be enabled?

A) HTTP response scanning
B) Attack Filters
C) Performance Monitoring
D) The "Default Inline IPS" policy
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
32
A Sensor allows the option of Layer2 forwarding for which of the following?

A) TCP and UDP ports only
B) UDP ports and VLAN interfaces only
C) TCP ports and VLAN interfaces only
D) TCP ports, UDP ports and VLAN interfaces
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
33
A Reconnaissance Policy can be applied to which of the following?

A) Sensors
B) Sensor Ports
C) Sensors and sensor ports
D) Specific Hosts
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following commands will reestablish the Alert and packet log channel connection between the sensor and manager?

A) Connectalertandpktlogchannels
B) Disconnectalertandptologchannels
C) reconnectalertandpktlogchannets
D) deinstall
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
35
Which sensor action allows the detection and dropping of attacks in real-time?

A) Host Quarantine action
B) ICMP Host unreachable
C) TCP reset
D) Drop further packets
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following actions can a Standby Manager of an MDR pair perform?

A) Modify sensor configuration
B) Policy configuration
C) Signature update
D) Configuration backup
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
37
________________allows a host to be subjected to both DHCP based NAC and Identity Based Access Control when configured on different ports.

A) Integrated NAC
B) DHCP based NAC
C) Hybrid NAC
D) Health based NAC
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is the proper step to take if an IP address change is made to the server where the Network Security Manager has been installed?

A) Change the IP address in the Network Security Manager settings
B) Change the IP address through a command-line statement
C) Reinstall the Network Security Manager
D) The IP address can never be changed on the Network Security Manager
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
39
Which operating mode allows a sensor lo prevent attacks from reaching their intended targets?

A) Tap
B) Span
C) In-line
D) Failover
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
40
When creating policies, which of the following rule sets are available for selection within those policies?

A) Only rule sets created using the Rule Set Editor
B) Only rule sets imported from the Sensor
C) Only rule sets created using the Rule Set Editor and Default rule sets
D) Only Default Rule sets
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
41
_____________________are a set of Access Control List (ACL) rules that define network access provided to a host, subject to Network Access Control.

A) Network Access Lists
B) Network Access Objects
C) Network Access Zones
D) Network Access Policy
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
42
What type of encryption is used for alert channel (control channel) communication between the Sensor and the Manager?

A) SSL with RC4
B) SSL with MD5
C) SSL with RC4 and MD5
D) DES
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following options is the best practice to use if you need to edit all attacks with a specific seventy number within an IPS policy?

A) Use the Bulk Edit feature within the Policy Editor
B) Create and run the appropriate database query
C) Edit the attacks individually
D) Use the Bulk Edit feature within the Reconnaissance Editor
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
44
If the Health Level of the host cannot be determined, which of the following System Health Levels would be assigned?

A) Fair
B) Poor
C) Serious
D) Unknown
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
45
By default, sensors are configured to operate in which operating mode?

A) In-line
B) Tap
C) SPAN
D) Failover
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
46
When McAfee NAC reports the host status as unmanaged with an Unknown Hearth Level, the sensor redirects the host to which of the following?

A) Guest Client Portal
B) NAC Client Portal
C) Sensor Client Portal
D) DNS Server Portal
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following activities require a reboot of a sensor? (Choose three)

A) Enabling/Disabling SSL
B) Enabling/Disabling parsing and detection of attacks in IPv4 traffic
C) Enabling/Disabling parsing and detection of attacks in IPv6 traffic
D) Sensor software upgrade
E) Signature update
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following are the methods used by NSP to recognize and react to Denial-of-Service (DoS) attacks? (Choose three)

A) Blocking
B) Shutting down the sensor
C) Thresholds
D) Self-learning
E) Logging
F) DDoS attack tool with exploit signatures
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
49
Which domains does a Super User have full rights to access?

A) Super Users have full rights to all domains
B) Super Users have full rights to only the domains in which they reside
C) Super Users have full rights to only sensor configuration
D) Super Users have full rights to only Parent domains
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following CLI commands will not cause an automatic reboot of the Sensor?

A) resetconfig
B) delete signatures
C) factorydefaults
D) deinstall
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following cannot be configured at the sub-interface level?

A) DoS Learning Mode
B) Assigned Policy
C) Attack Filters
D) Interface type
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
52
In double VLAN tagging, the second VLAN tag inserted into the frame is called the:

A) Customer Identification tag (CD)
B) VLAN Identifier tag (VID)
C) Outer Identifier tag (OID)
D) Inner Identifier tad (ID)
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
53
In L3 mode, a sensor detects an L2 device based on which address?

A) MAC
B) IP
C) Default Gateway
D) DNS
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
54
Where in the Network Security Manager console can you see a hierarchical view of all the installed applications currently deployed and the resources associated with each?

A) Device List
B) Resource Tree
C) Details Pane
D) System Links
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 54 flashcards in this deck.