Cisco IPS v7 (642-627) 20 questions
These are ONLY multiple choice questions, no drag/drop, hotspot or sim.
Deny connection
Deny attacker
Reset TCP connection
Deny packet, reset TCP connection
Deny connection, reset TCP connection
Rate this question:
ESP
GRE
TLS
STP
VTI
802.1Q
Rate this question:
Produce verbose alert
Request rate limit
Reset TCP connection
Log attacker/victim pair packets
Deny-packet-inline
Request block connection
Rate this question:
The percentage of the signatures to be tuned by the event action filter
The percentage of the Risk Rating value to be tuned by the event action filter
The percentage of packets to be denied for the deny attacker actions
the percentage of the signatures to be tuned by the event action overrides
Rate this question:
A new signature engine update package has been loaded to the Cisco IPS appliance.
A new signature/virus update package has been loaded to the Cisco IPS appliance.
Summarizer has been disabled globally.
All the signatures have been set to the default state.
All the signatures have been retired, and then unretired.
Rate this question:
Anomaly detection
Threat rating adjustment
Event action override that denies high-risk network traffic with a risk rating of 90 to 100
Risk rating adjustment with global correlation
Reputation filters
Rate this question:
To enable the Cisco IPS appliance as a master blocking sensor
To enable management hosts to access the Cisco IPS appliance
To regenerate the Cisco IPS appliance SSH host key
To regenerate the Cisco IPS appliance SSL RSA key pair
To enable communications with a blocking device
Rate this question:
Configure a VLAN interface as a management interface to access the Cisco ASA AIP-SSC.
Using MPF, configure which virtual sensor to use.
Configure a management access rule to allow Cisco ASDM access from the Cisco ASA AIPSSC management interface IP address.
Configure a management access rule to allow SSH access from the Cisco ASA AIP-SSC management interface IP address.
Rate this question:
Anomaly detection
Event action overrides
Global correlation
Reputation filter
Rate this question:
SDEE
Global correlation
Anomaly detection
Remote blocking
Virtual sensor
OS fingerprinting
Rate this question:
Risk rating and adjustment based on the prevention actions taken
Threat rating and event action overrides
Event action overrides and event action filters
Risk rating and target value rating
Alert severity and alert actions
Rate this question:
The low risk rating threshold
The low threat rating threshold
The low target value rating threshold
The high risk rating threshold
The high threat rating threshold
The high target value rating threshold
Rate this question:
AIP-SSM
AIP-SSC
IPS AIM
IPS NME
IDSM-2
Rate this question:
From manually configured OS mappings
Imported OS mappings from Management Center for Cisco Security Agent
Imported OS mappings from Cisco Security Manager
Learned OS mappings from passive OS fingerprinting
Learned OS mappings from CiscoSensorBase input
From Cisco IPS signature updates
Rate this question:
Signature-definition
Event-action-rules
Global-correlation-rules
Anomaly-detection
Reputation-filters
External-product-interfaces
Rate this question:
From a single source you do not expect to see non stablished connections to more than 120 different destination IP addresses.
From a single source you do not expect to see nonestablished connections to more than 100 different destination IP addresses.
You do not expect to see more than 5 sources generate nonestablished connections to 10 or more different destinations.
You do not expect to see more than 10 sources generate nonestablished connections to 5 or more different destinations.
A scanner threshold of 120 is not a valid value for this histogram.
Scanning attacks will not be triggered, because the scanner threshold is higher than the maximum number of destination IP addresses in the histogram.
Scanning attacks will not be triggered, because the scanner threshold is higher than the maximum number of source IP addresses in the histogram.
Rate this question:
Place the Cisco IPS appliance behind a firewall.
Disable unneeded signatures.
Enable unidirectional capture.
Have multiple Cisco IPS appliances in the path and configure them to detect different types of events.
Enable selective packet capture using VLAN ACL on the Cisco IPS 4200 Series appliance.
Enable all anti-evasive measures to reduce noise.
Rate this question:
Only operates in inline modes
Ensures that Layer 4 to Layer 7 traffic conforms to the protocol specifications
Tracks session states and stops packets that do not fully match session state
Modifies ambiguously fragmented IP traffic
Cannot analyze asymmetric traffic flows
Rate this question:
Configure an additional SPAN session to a different Cisco IPS appliance interface connected to the same virtual sensor.
Configure an EtherChannel bundle as the SPAN destination port.
Configure RSPAN.
Configure VACL capture.
Configure the Cisco IPS appliance to inline mode.
Rate this question:
Quiz Review Timeline (Updated): Mar 18, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.