1.
An SFR module has been installed in the adaptive security appliance. Which command must be executed on the module to establish connectivity to FireSIGHT Management Center?
2.
Which application is required to enable Microsoft Active Directory identity integration for FirePOWER services?
3.
Which port should be allowed to support communications between Sourcefire User Agent and FireSIGHT Management Center?
4.
Which access policy action should be applied if traffic is to pass without applying any additional inspection?

 
5.
An access policy that uses URL reputation values is defined. Which option best describes what happens if a reputation is not available for a URL?
6.
Detection of an exploit kit that is installed on a device is an example of which IoC event category?
7.
A file-type embedded attack is an example of which IoC event category?
8.
Which option best describes the role of an IoC?
9.
Which statement describes what happens during a file-disposition check for malware?
10.
Which threat score rating is the default value that identifies malware?