Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

500-285 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

500-285 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Securing Cisco Networks with Sourcefire IPS
  • Last Update: Sep 12, 2025
  • Questions and Answers: 60
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

500-285 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

500-285 Practice Exam Questions with Answers Securing Cisco Networks with Sourcefire IPS Certification

Question # 6

Which option is true of the Packet Information portion of the Packet View screen?

A.

provides a table view of events

B.

allows you to download a PCAP formatted file of the session that triggered the event

C.

displays packet data in a format based on TCP/IP layers

D.

shows you the user that triggered the event

Full Access
Question # 7

The gateway VPN feature supports which deployment types?

A.

SSL and HTTPS

B.

PPTP and MPLS

C.

client and route-based

D.

point-to-point, star, and mesh

Full Access
Question # 8

Stacking allows a primary device to utilize which resources of secondary devices?

A.

interfaces, CPUs, and memory

B.

CPUs and memory

C.

interfaces, CPUs, memory, and storage

D.

interfaces and storage

Full Access
Question # 9

Which statement is true regarding malware blocking over HTTP?

A.

It can be done only in the download direction.

B.

It can be done only in the upload direction.

C.

It can be done in both the download and upload direction.

D.

HTTP is not a supported protocol for malware blocking.

Full Access
Question # 10

Which option can you enter in the Search text box to look for the trajectory of a particular file?

A.

the MD5 hash value of the file

B.

the SHA-256 hash value of the file

C.

the URL of the file

D.

the SHA-512 hash value of the file

Full Access
Question # 11

When configuring an LDAP authentication object, which server type is available?

A.

Microsoft Active Directory

B.

Yahoo

C.

Oracle

D.

SMTP

Full Access
Question # 12

Context Explorer can be accessed by a subset of user roles. Which predefined user role is valid for FireSIGHT event access?

A.

Administrator

B.

Intrusion Administrator

C.

Maintenance User

D.

Database Administrator

Full Access
Question # 13

A one-to-many type of scan, in which an attacker uses a single host to scan a single port on multiple target hosts, indicates which port scan type?

A.

port scan

B.

portsweep

C.

decoy port scan

D.

ACK scan

Full Access
Question # 14

Which feature of the preprocessor configuration pages lets you quickly jump to a list of the rules associated with the preprocessor that you are configuring?

A.

the rule group accordion

B.

a filter bar

C.

a link below the preprocessor heading

D.

a button next to each preprocessor option that has a corresponding rule

Full Access
Question # 15

Host criticality is an example of which option?

A.

a default whitelist

B.

a default traffic profile

C.

a host attribute

D.

a correlation policy

Full Access
Question # 16

In addition to the discovery of new hosts, FireSIGHT can also perform which function?

A.

block traffic

B.

determine which users are involved in monitored connections

C.

discover information about users

D.

route traffic

Full Access
Question # 17

When you are editing an intrusion policy, how do you know that you have changes?

A.

The Commit Changes button is enabled.

B.

A system message notifies you.

C.

You are prompted to save your changes on every screen refresh.

D.

A yellow, triangular icon displays next to the Policy Information option in the navigation panel.

Full Access
Question # 18

Which option is used to implement suppression in the Rule Management user interface?

A.

Rule Category

B.

Global

C.

Source

D.

Protocol

Full Access