When placed in Layer3 mode, a Sensor detects a Layer2 device based on which of the following?
A. MAC address
B. IP address
C. DNS
D. Subnet
Which port is correctly defined for the Alert Channel on the Network Security Manager?
A. 8500
B. 8501
C. 8502
D. 8504
Which attack cannot be blocked when the sensor has been set for in-line mode?
A. TCP Control Anomaly
B. ICMP Echo Anomaly
C. Too Many Inbound Syn
D. SCADA Attacks
Which step needs to be completed before a sensor can be configured?
A. Sensor IP addressing must be set
B. Sensor must be added to the Manager
C. Sensor username and password must be set
D. Sensor Gateway addressing must be set
Which port needs to be opened for install Channel communication between Sensor and Manager through a firewall?
A. 8501
B. 8502
C. 8503
D. 8555
Which port needs to be opened for Alert Viewer communication between Client and Manager through a firewall?
A. 8501
B. 8502
C. 8503
D. 8555
Setting a threshold limit in order for the IPS to react if traffic volume exceeds this limit is an example of which type of detection method?
A. Statistical anomaly
B. Protocol anomaly
C. Pattern matching
D. Application anomaly
Which of the following cannot be configured at the sub-interface level?
A. DoS Learning Mode
B. Assigned Policy
C. Attack Filters
D. Interface type
What type of encryption is used for alert channel (control channel) communication between the Sensor and the Manager?
A. SSL with RC4
B. SSL with MD5
C. SSL with RC4 and MD5
D. DES
Which of the following CLI commands only removes trust between a sensor and manager?
A. Resetconfig
B. Deletesignatures
C. Factorydefaults
D. Deinstall