[Free] 2017(Sep) CollectDumps Testinsides Cisco 500-290 Dumps with VCE and PDF 21-30

CollectDumps 2017 Sep Cisco Official New Released 500-290
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/500-290.html

IPS Express Security Engineer Representative (IPSESER)

Question No: 21

The IP address ::/0 is equivalent to which IPv4 address and netmask?

A. 0.0.0.0

B. 0.0.0.0/0

C. 0.0.0.0/24

D. The IP address ::/0 is not valid IPv6 syntax.

Answer: B

Question No: 22

In addition to the discovery of new hosts, FireSIGHT can also perform which function?

  1. block traffic

  2. determine which users are involved in monitored connections

  3. discover information about users

  4. route traffic

Answer: B

Question No: 23

A user discovery agent can be installed on which platform?

  1. OpenLDAP

  2. Windows

  3. RADIUS

  4. Ubuntu

Answer: B

Question No: 24

Other than navigating to the Network File Trajectory page for a file, which option is an alternative way of accessing the network trajectory of a file?

  1. from Context Explorer

  2. from the Analysis menu

  3. from the cloud

  4. from the Defense Center

Answer: A

Question No: 25

Which option can you enter in the Search text box to look for the trajectory of a particular file?

  1. the MD5 hash value of the file

  2. the SHA-256 hash value of the file

  3. the URL of the file

  4. the SHA-512 hash value of the file

Answer: B

Question No: 26

A context box opens when you click on an event icon in the Network File Trajectory map for a file. Which option is an element of the box?

  1. Scan

  2. Application Protocol

  3. Threat Name

  4. File Name

Answer: B

Question No: 27

Which policy controls malware blocking configuration?

  1. file policy

  2. malware policy

  3. access control policy

  4. IPS policy

Answer: A

Question No: 28

Which statement is true regarding malware blocking over HTTP?

  1. It can be done only in the download direction.

  2. It can be done only in the upload direction.

  3. It can be done in both the download and upload direction.

  4. HTTP is not a supported protocol for malware blocking.

Answer: C

Question No: 29

Which option describes Spero file analysis?

  1. a method of analyzing the SHA-256 hash of a file to determine whether a file is malicious or not

  2. a method of analyzing the entire contents of a file to determine whether it is malicious or not

  3. a method of analyzing certain file characteristics, such as metadata and header information, to determine whether a file is malicious or not

  4. a method of analyzing a file by executing it in a sandbox environment and observing its behaviors to determine if it is malicious or not

Answer: C

Question No: 30

Which event source can have a default workflow configured?

  1. user events

  2. discovery events

  3. server events

  4. connection events

Answer: B

100% Free Download!
Download Free Demo:500-290 Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps 500-290 Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE