1.
Which four networking tools does Cisco IME include that can be invoked for specific events, to learn more about attackers and victims using basic network reconnaissance? (Choose four.)
2.
The AIP-SSM CLI can be accessed from the ASA CLI by using which command?
3.
Which four statements are true about the Cisco IPS global correlation and reputation filtering features? (Choose four.)
4.
When setting up a Cisco IPS appliance in promiscuous mode, which Cisco Catalyst switch CLI command is used to configure SPAN on the switch?
5.
Which ASA CLI command is used to configure the network parameters for downloading the AIP-SSM recovery image?
6.
Which global correlation data is sent to the Cisco SensorBase Network with full network participation that is not sent with partial network participation?
7.
Which Cisco IPS feature is most likely to respond to a zero-day attack?
8.
Which Cisco IDM pane is used to add the public keys of all the SSH clients that are allowed to connect to the IPS appliance SSH server using RSA authentication?
9.
You are tasked to create a custom IPS signature using the IDM Custom Signature Wizard to detect a network reconnaissance attack in which one system makes connections to multiple hosts on multiple TCP ports. Which Cisco IPS signature engine should be selected to configure this custom IPS signature?
10.
Which Cisco IPS signature parameter cannot be edited using IDM?