300-207 Exam - Implementing Cisco Threat Control Solutions (SITCS)

certleader.com

Q1. Which configuration mode enables a virtual sensor to monitor the session state for unidirectional traffic? 

A. asymmetric mode 

B. symmetric mode 

C. loose mode 

D. strict mode 

Answer:

Q2. What action will the sensor take regarding IP addresses listed as known bad hosts in the Cisco SensorBase network? 

A. Global correlation is configured in Audit mode fortesting the feature without actually denying any hosts. 

B. Global correlation is configured in Aggressive mode, which has a very aggressive effect on deny actions. 

C. It will not adjust risk rating values based on the known bad hosts list. 

D. Reputation filtering is disabled. 

Answer:

Explanation: 

This can be seen on the Globabl Correlation – Inspection/Reputation tab show below: 

Q3. Which Cisco IPS deployment mode is best suited for bridged interfaces? 

A. inline interface pair mode 

B. inline VLAN pair mode 

C. inline VLAN group mode 

D. inline pair mode 

Answer:

Q4. If learning accept mode is set to "auto" and the knowledge base is loaded only when explicitly requested on the IPS, which statement about the knowledge base is true? 

A. The knowledge base is set to load dynamically. 

B. The knowledge base is set to "save only." 

C. The knowledge base is set to "discarded." 

D. The knowledge base is set to load statically. 

Answer:

Q5. What can you use to access the Cisco IPS secure command and control channel to make configuration changes? 

A. SDEE 

B. the management interface 

C. an HTTP server 

D. Telnet 

Answer:

Q6. Which Cisco IPS CLI command shows the most fired signature? 

A. show statistics virtual-sensor 

B. show event alert 

C. show alert 

D. show version 

Answer:

Q7. What is the status of OS Identification? 

A. It is only enabled to identify "Cisco IOS" OS using statically mapped OS fingerprinting 

B. OS mapping information will not be used for Risk Rating calculations. 

C. It is configured to enable OS mapping and ARR only for the 10.0.0.0/24 network. 

D. It is enabled for passive OS fingerprinting for all networks. 

Answer:

Explanation: 

Understanding Passive OS Fingerprinting.Passive OS fingerprinting lets the sensor determine the OS that hosts are running. The sensor analyzes network traffic between hosts and stores the OS of these hosts with their IP addresses. The sensor inspects TCP SYN and SYNACK packets exchanged on the network to determine the OS type..The sensor then uses the OS of the target host OS to determine the relevance of the attack to the victim by computing the attack relevance rating component of the risk rating. Based on the relevance of the attack, the sensor may alter the risk rating of the alert for the attack and/or the sensor may filter the alert for the attack. You can then use the risk rating to reduce the number of false positive alerts (a benefit in IDS mode) or definitively drop suspicious packets (a benefit in IPS mode). Passive OS fingerprinting also enhances the alert output by reporting the victim OS, the source of the OS identification, and the relevance to the victim OS in the alert..Passive OS fingerprinting consists of three components: .Passive OS learning.Passive OS learning occurs as the sensor observes traffic on the network. Based on the characteristics of TCP SYN and SYNACK packets, the sensor makes a determination of the OS running on the host of the source IP address. 

.User-configurable OS identification.You can configure OS host mappings, which take precedence over learned OS mappings. .Computation of attack relevance rating and risk rating 

Q8. Which five system management protocols are supported by the Cisco Intrusion Prevention System? (Choose five.) 

A. SNMPv2c 

B. SNMPv1 

C. SNMPv2 

D. SNMPv3 

E. Syslog 

F. SDEE 

G. SMTP 

Answer: A,B,C,F,G 

Q9. Which Cisco Security IntelliShield Alert Manager Service component mitigates new botnet, phishing, and web-based threats? 

A. the IntelliShield Threat Outbreak Alert 

B. IntelliShield Alert Manager vulnerability alerts 

C. the IntelliShield Alert Manager historical database 

D. the IntelliShield Alert Manager web portal 

E. the IntelliShield Alert Manager back-end intelligence engine 

Answer:

Q10. Refer to the exhibit. 

When designing the network to redirect web traffic utilizing the Catalyst 6500 to the Cisco Web Security Appliance, impact on the switch platform needs consideration. Which four rows identify the switch behavior in correlation to the redirect method? (Choose four.) 

A. Row 1 

B. Row 2 

C. Row 3 

D. Row 4 

E. Row 5 

F. Row 6 

G. Row 7 

H. Row 8 

Answer: B,C,F,G