Where in the Network Security Manager console can you see a hierarchical view of all the installed applications currently deployed and the resources associated with each?
What type of encryption is used for file transfers between the Sensor and the Manager?
IPS Policies can be enforced at which of the following sensor nodes?
What type of encryption is used for packet log transfers between the Sensor and the Manager?
As a recommended best practice, what is the total number of sensors that should be managed through a single Network Security Manager installation?
A sensor is placed in-line and is dropping traffic. This situation demands an immediate removal of the sensor from the network to let traffic flow uninterrupted. Which option will you use to verify whether the issue is due to sensor configuration or network congestion?
________________allows a host to be subjected to both DHCP based NAC and Identity Based Access Control when configured on different ports.
Select the deployment method which enables the most effective Protection/Prevent on mode of operation.
Which NSP sensor models support SSL encryption? (Choose three)
Why is the DBAdmin tool considered a preferred method of performing system maintenance tasks that could be performed within the Manager?
Which of the following information is unique to Host Intrusion Prevention alerts? (Choose three)
In double VLAN tagging, the second VLAN tag inserted into the frame is called the:
What is the command to force the sensor out of Layer 2 Passthru mode?