[Free] 2018(Jan) EnsurePass Pass4sure Cisco 500-285 Dumps with VCE and PDF 21-30

By | January 31, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Cisco Official New Released 500-285
100% Free Download! 100% Pass Guaranteed!

Securing Cisco Networks with Sourcefire IPS

Question No: 21 – (Topic 5)

When configuring FireSIGHT detection, an administrator would create a network discovery policy and set the action to quot;discoverquot;. Which option is a possible type of discovery?

  1. host

  2. IPS event

  3. anti-malware

  4. networks

Answer: A

Question No: 22 – (Topic 5)

A user discovery agent can be installed on which platform?

  1. OpenLDAP

  2. Windows


  4. Ubuntu

Answer: B

Question No: 23 – (Topic 5)

Host criticality is an example of which option?

  1. a default whitelist

  2. a default traffic profile

  3. a host attribute

  4. a correlation policy

Answer: C

Topic 6, Network Based Malware Detection

Question No: 24 – (Topic 6)

Which policy controls malware blocking configuration?

  1. file policy

  2. malware policy

  3. access control policy

  4. IPS policy

Answer: A

Question No: 25 – (Topic 6)

Which option describes Spero file analysis?

  1. a method of analyzing the SHA-256 hash of a file to determine whether a file is malicious or not

  2. a method of analyzing the entire contents of a file to determine whether it is malicious or not

  3. a method of analyzing certain file characteristics, such as metadata and header information, to determine whether a file is malicious or not

  4. a method of analyzing a file by executing it in a sandbox environment and observing its

behaviors to determine if it is malicious or not

Answer: C

Question No: 26 – (Topic 6)

Which option can you enter in the Search text box to look for the trajectory of a particular file?

  1. the MD5 hash value of the file

  2. the SHA-256 hash value of the file

  3. the URL of the file

  4. the SHA-512 hash value of the file

Answer: B

Question No: 27 – (Topic 6)

Other than navigating to the Network File Trajectory page for a file, which option is an alternative way of accessing the network trajectory of a file?

  1. from Context Explorer

  2. from the Analysis menu

  3. from the cloud

  4. from the Defense Center

Answer: A

Question No: 28 – (Topic 6)

Which statement is true regarding malware blocking over HTTP?

  1. It can be done only in the download direction.

  2. It can be done only in the upload direction.

  3. It can be done in both the download and upload direction.

  4. HTTP is not a supported protocol for malware blocking.

Answer: C

Question No: 29 – (Topic 6)

A context box opens when you click on an event icon in the Network File Trajectory map for a file. Which option is an element of the box?

  1. Scan

  2. Application Protocol

  3. Threat Name

  4. File Name

Answer: B

Topic 7, Basic Administration

Question No: 30 – (Topic 7)

Which statement regarding user exemptions is true?

  1. Non-administrators can be made exempt on an individual basis.

  2. Exempt users have a browser session timeout restriction of 24 hours.

  3. Administrators can be exempt from any browser session timeout value.

  4. By default, all users cannot be exempt from any browser session timeout value.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:500-285 Demo PDF
100% Ensurepass Free Guaranteed!
500-285 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.