What is the best way to mitigate the risk that executable-code exploits will perform malicious acts such as erasing your hard drive?
Which type of signature engine is best suited for creating custom signatures that inspect data at Layer 5 and above?
Which signature action or actions should be selected to cause the attacker’s traffic flow to terminate when the Cisco IPS Sensor is operating in promiscuous mode?
What precaution must you keep in mind when adding, editing, or deleting allowed hosts on a Cisco IPS Sensor?
Which character must precede a variable to indicate that you are using a variable rather than a string?