• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Automatic Application ByPass

Limits the time that is allowed to process packets through an interface and allows traffic to bypass detection if the time is exceeded.



This option causes the offending detection module to core dump and restart when the bypass is triggered.

Static


Dynamic IP


Dynamic IP + Port

1. One to one translatino on destination networks


2. Many-to-many source networks mainting port and protocol


3. Many-to-on or many-to-many source networks and port and protocol

VPN Gateway requires what licenses?

Protection


Control


VPN

Gateway VPN is only supported on what series devices?

Series 3

Stacking

Combines two or more devices using the network confiugration on one primary device and the CPU and memory resources of all the devices in the stack

Types of VPN

P2P, mess, star

Variables Set

Variables represent values that are commonly used in intrusion rules ot identify source and destination IP addresses and ports. You can also use variables in instrusion policies to represent IP addresses in rule suppressions, adaptive profiles, and dynamic state rules

To use your variables, you do what?

Link variable sets to intrusion policies that are associated with access control rules or with the default action of an access control policy.

Policy specific variables are defined where?

User-Set

System variables are defined where?

Variable set

Security Zone

A Grouping of one or more interface against which access control policies may be applied to handle traffic.



Identify source and destination interfaces, while also serving as a mechanism for classifying traffic.

File Disposition Caching

Clean = 4 hours


Malware = 1 hour


Neutral = 1 hour

Firesite Implements three primary types of detenction to derive an understanding of the network, which are?

Discovery


Connection


Users