1.
Setting a threshold on a sensor to react if traffic volume exceeds the threshold limit is an example of what specific detection method?
2.
Which logs are used to determine who was logged into the Manager the last time a signature set update was pushed from the Manager to the Sensor?
3.
Which operating mode allows a sensor lo prevent attacks from reaching their intended targets?
4.
Why would attacks not be blocked when the Sensor monitoring ports are configured in SPAN mode?
5.
How are packet logs viewed from within the Manager?
6.
Which command can be issued on a Sensor to check the health of the Sensor?
7.
Which CLI command is used to determine that the Sensor has established trust with the Manager?
8.
Which of the following commands will reestablish the Alert and packet log channel connection between the sensor and manager?
9.
What type of encryption is used for packet log transfers between the Sensor and the Manager?
10.
When creating policies, which of the following rule sets are available for selection within those policies?