You have been made aware of new and unwanted traffic on your network. You want to create a signature to monitor and perform an action against that traffic when certain thresholds are reached. What would be the best way to configure this new signature?
“Pass Any Exam. Any Time.” – www. 10
Cisco 642-533: Practice Exam
A.
Use the Anomaly Detection functions to learn about the unwanted traffic, then create a newMeta signature using Cisco IDM.
B.
Use the Custom Signature Wizard.
C.
Edit a built-in signature that closely matches the traffic you are trying to prevent.
D.
Clone and edit an existing signature that closely matches the traffic you are trying to prevent.
E.
Create a new signature definition, edit it, and then enable it.