One of the goals of geolocation is to identify which option?
A. the location of any IP address
B. the location of a MAC address
C. the location of a TCP connection
D. the location of a routable IP address
Which option is used to implement suppression in the Rule Management user interface?
A. Rule Category
B. Global
C. Source
D. Protocol
The IP address::/0 is equivalent to which IPv4 address and netmask?
A. 0.0.0.0
B. 0.0.0.0/0
C. 0.0.0.0/24
D. The IP address::/0 is not valid IPv6 syntax.
In addition to the discovery of new hosts, FireSIGHT can also perform which function?
A. block traffic
B. determine which users are involved in monitored connections
C. discover information about users
D. route traffic
A user discovery agent can be installed on which platform?
A. OpenLDAP
B. Windows
C. RADIUS
D. Ubuntu
A. It can be done only in the download direction.
B. It can be done only in the upload direction.
C. It can be done in both the download and upload direction.
D. HTTP is not a supported protocol for malware blocking.
Which statement regarding user exemptions is true?
A. Non-administrators can be made exempt on an individual basis.
B. Exempt users have a browser session timeout restriction of 24 hours.
C. Administrators can be exempt from any browser session timeout value.
D. By default, all users cannot be exempt from any browser session timeout value.
Where do you configure widget properties?
A. dashboard properties
B. the Widget Properties button in the title bar of each widget
C. the Local Configuration page
D. Context Explorer
Context Explorer can be accessed by a subset of user roles. Which predefined user role is not valid for FireSIGHT event access?
A. Administrator
B. Intrusion Administrator
C. Security Analyst
D. Security Analyst (Read-Only)
When configuring an LDAP authentication object, which server type is available?
A. Microsoft Active Directory
B. Yahoo
C. Oracle
D. SMTP