Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

500-285 Cisco Securing Cisco Networks with Sourcefire IPS Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 500-285 Securing Cisco Networks with Sourcefire IPS certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

Which option transmits policy-based alerts such as SNMP and syslog?

A.

the Defense Center

B.

FireSIGHT

C.

the managed device

D.

the host

When adding source and destination ports in the Ports tab of the access control policy rule editor, which restriction is in place?

A.

The protocol is restricted to TCP only.

B.

The protocol is restricted to UDP only.

C.

The protocol is restricted to TCP or UDP.

D.

The protocol is restricted to TCP and UDP.

Which option describes the two basic components of Sourcefire Snort rules?

A.

preprocessor configurations to define what to do with packets before the detection engine sees them, and detection engine configurations to define exactly how alerting is to take place

B.

a rule statement characterized by the message you configure to appear in the alert, and the rule body that contains all of the matching criteria such as source, destination, and protocol

C.

a rule header to define source, destination, and protocol, and the output configuration to determine which form of output to produce if the rule triggers

D.

a rule body that contains packet-matching criteria or options to define where to look for content in a packet, and a rule header to define matching criteria based on where a packet originates, where it is going, and over which protocol

Which mechanism should be used to write an IPS rule that focuses on the client or server side of a TCP communication?

A.

the directional operator in the rule header

B.

the "flow" rule option

C.

specification of the source and destination ports in the rule header

D.

The detection engine evaluates all sides of a TCP communication regardless of the rule options.

Which option is not a characteristic of dashboard widgets or Context Explorer?

A.

Context Explorer is a tool used primarily by analysts looking for trends across varying periods of time.

B.

Context Explorer can be added as a widget to a dashboard.

C.

Widgets offer users an at-a-glance view of their environment.

D.

Widgets are offered to all users, whereas Context Explorer is limited to a few roles.

Which option is true of the Packet Information portion of the Packet View screen?

A.

provides a table view of events

B.

allows you to download a PCAP formatted file of the session that triggered the event

C.

displays packet data in a format based on TCP/IP layers

D.

shows you the user that triggered the event

Which Sourcefire feature allows you to send traffic directly through the device without inspecting it?

A.

fast-path rules

B.

thresholds or suppressions

C.

blacklist

D.

automatic application bypass

Stacking allows a primary device to utilize which resources of secondary devices?

A.

interfaces, CPUs, and memory

B.

CPUs and memory

C.

interfaces, CPUs, memory, and storage

D.

interfaces and storage

When configuring FireSIGHT detection, an administrator would create a network discovery policy and set the action to "discover". Which option is a possible type of discovery?

A.

host

B.

IPS event

C.

anti-malware

D.

networks

Which option is derived from the discovery component of FireSIGHT technology?

A.

connection event table view

B.

network profile

C.

host profile

D.

authentication objects

A one-to-many type of scan, in which an attacker uses a single host to scan a single port on multiple target hosts, indicates which port scan type?

A.

port scan

B.

portsweep

C.

decoy port scan

D.

ACK scan

What does packet latency thresholding measure?

A.

the total elapsed time it takes to process a packet

B.

the amount of time it takes for a rule to process

C.

the amount of time it takes to process an event

D.

the time span between a triggered event and when the packet is dropped

What are the two categories of variables that you can configure in Object Management?

A.

System Default Variables and FireSIGHT-Specific Variables

B.

System Default Variables and Procedural Variables

C.

Default Variables and Custom Variables

D.

Policy-Specific Variables and Procedural Variables

Which option is one of the three methods of updating the IP addresses in Sourcefire Security Intelligence?

A.

subscribe to a URL intelligence feed

B.

subscribe to a VRT

C.

upload a list that you create

D.

automatically upload lists from a network share

When configuring an LDAP authentication object, which server type is available?

A.

Microsoft Active Directory

B.

Yahoo

C.

Oracle

D.

SMTP

Context Explorer can be accessed by a subset of user roles. Which predefined user role is not valid for FireSIGHT event access?

A.

Administrator

B.

Intrusion Administrator

C.

Security Analyst

D.

Security Analyst (Read-Only)

The collection of health modules and their settings is known as which option?

A.

appliance policy

B.

system policy

C.

correlation policy

D.

health policy

Remote access to the Defense Center database has which characteristic?

A.

read/write

B.

read-only

C.

Postgres

D.

Estreamer

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved