Quiz 642-532, Securing Networks Using Intrusion Prevention Systems
What is an appropriate action to take?
How does a Cisco network sensor detect malicious network activity?
Which three steps must you perform to prepare sensor interfaces for inline operations?
Which two should you use to accomplish your goal in the most time-efficient manner?
Which command resets all signature settings back to the factory defaults?
which purpose is a sensor license needed?
Which two are not forwarded to the NM-CIDS?
(Choose three.)
which scenario are an AIC engine and the Application Policy Enforcement feature needed?
What is the primary function of a Master Blocking Sensor?