cisco 500-285 online test

Securing Cisco Networks with Sourcefire IPS

What students need to know about the 500-285 exam

  • Total 61 Questions & Answers

Question 1 Topic 1

Topic 1
What are the two categories of variables that you can configure in Object Management?

  • A. System Default Variables and FireSIGHT-Specific Variables
  • B. System Default Variables and Procedural Variables
  • C. Default Variables and Custom Variables
  • D. Policy-Specific Variables and Procedural Variables
Answer:

C

Discussions

Question 2 Topic 1

Topic 1
Which option is true regarding the $HOME_NET variable?

  • A. is a policy-level variable
  • B. has a default value of "all"
  • C. defines the network the active policy protects
  • D. is used by all rules to define the internal network
Answer:

C

Discussions

Question 3 Topic 1

Topic 1
Which option is one of the three methods of updating the IP addresses in Sourcefire Security Intelligence?

  • A. subscribe to a URL intelligence feed
  • B. subscribe to a VRT
  • C. upload a list that you create
  • D. automatically upload lists from a network share
Answer:

C

Discussions

Question 4 Topic 1

Topic 1
Which statement is true in regard to the Sourcefire Security Intelligence lists?
A. The global blacklist universally allows all traffic through the managed device.
B. The global whitelist cannot be edited.
C. IP addresses can be added to the global blacklist by clicking on interactive graphs in Context Explorer.
D. The Security Intelligence lists cannot be updated.

Answer:

C
Topic 2, Access Control Policy

Discussions

Question 5 Topic 2

Topic 2
Which statement is true when adding a network to an access control rule?

  • A. You can select only source networks.
  • B. You must have preconfigured the network as an object.
  • C. You can select the source and destination networks or network groups.
  • D. You cannot include multiple networks or network groups as sources or destinations.
Answer:

C

Discussions

Question 6 Topic 2

Topic 2
Which option is true when configuring an access control rule?

  • A. You can use geolocation criteria to specify source IP addresses by country and continent, as well as destination IP addresses by country and continent.
  • B. You can use geolocation criteria to specify destination IP addresses by country but not source IP addresses.
  • C. You can use geolocation criteria to specify source and destination IP addresses by country but not by continent.
  • D. You can use geolocation criteria to specify source and destination IP addresses by continent but not by country.
Answer:

A

Discussions

Question 7 Topic 2

Topic 2
How do you configure URL filtering?

  • A. Add blocked URLs to the global blacklist.
  • B. Create a Security Intelligence object that contains the blocked URLs and add the object to the access control policy.
  • C. Create an access control rule and, on the URLs tab, select the URLs or URL categories that are to be blocked or allowed.
  • D. Create a variable.
Answer:

C

Discussions

Question 8 Topic 2

Topic 2
When adding source and destination ports in the Ports tab of the access control policy rule editor, which restriction is in
place?

  • A. The protocol is restricted to TCP only.
  • B. The protocol is restricted to UDP only.
  • C. The protocol is restricted to TCP or UDP.
  • D. The protocol is restricted to TCP and UDP.
Answer:

C

Discussions

Question 9 Topic 2

Topic 2
Access control policy rules can be configured to block based on the conditions that you specify in each rule. Which behavior
block response do you use if you want to deny and reset the connection of HTTP traffic that meets the conditions of the
access control rule?

  • A. interactive block with reset
  • B. interactive block
  • C. block
  • D. block with reset
Answer:

D

Discussions

Question 10 Topic 2

Topic 2
Which option transmits policy-based alerts such as SNMP and syslog?
A. the Defense Center
B. FireSIGHT
C. the managed device
D. the host

Answer:

C
Topic 3, Event Analysis

Discussions
To page 2