Exam Details

  • Exam Code
    :500-285
  • Exam Name
    :Securing Cisco Networks with Sourcefire Intrusion Prevention System
  • Certification
    :Cisco Certifications
  • Vendor
    :Cisco
  • Total Questions
    :60 Q&As
  • Last Updated
    :Mar 23, 2025

Cisco Cisco Certifications 500-285 Questions & Answers

  • Question 31:

    Which statement regarding user exemptions is true?

    A. Non-administrators can be made exempt on an individual basis.

    B. Exempt users have a browser session timeout restriction of 24 hours.

    C. Administrators can be exempt from any browser session timeout value.

    D. By default, all users cannot be exempt from any browser session timeout value.

  • Question 32:

    Remote access to the Defense Center database has which characteristic?

    A. read/write

    B. read-only

    C. Postgres

    D. Estreamer

  • Question 33:

    A. It can be done only in the download direction.

    B. It can be done only in the upload direction.

    C. It can be done in both the download and upload direction.

    D. HTTP is not a supported protocol for malware blocking.

  • Question 34:

    Which option can you enter in the Search text box to look for the trajectory of a particular file?

    A. the MD5 hash value of the file

    B. the SHA-256 hash value of the file

    C. the URL of the file

    D. the SHA-512 hash value of the file

  • Question 35:

    A context box opens when you click on an event icon in the Network File Trajectory map for a file. Which option is an element of the box?

    A. Scan

    B. Application Protocol

    C. Threat Name

    D. File Name

  • Question 36:

    Which option describes Spero file analysis?

    A. a method of analyzing the SHA-256 hash of a file to determine whether a file is malicious or not

    B. a method of analyzing the entire contents of a file to determine whether it is malicious or not

    C. a method of analyzing certain file characteristics, such as metadata and header information, to determine whether a file is malicious or not

    D. a method of analyzing a file by executing it in a sandbox environment and observing its behaviors to determine if it is malicious or not

  • Question 37:

    Other than navigating to the Network File Trajectory page for a file, which option is an alternative way of accessing the network trajectory of a file?

    A. from Context Explorer

    B. from the Analysis menu

    C. from the cloud

    D. from the Defense Center

  • Question 38:

    In addition to the discovery of new hosts, FireSIGHT can also perform which function?

    A. block traffic

    B. determine which users are involved in monitored connections

    C. discover information about users

    D. route traffic

  • Question 39:

    A user discovery agent can be installed on which platform?

    A. OpenLDAP

    B. Windows

    C. RADIUS

    D. Ubuntu

  • Question 40:

    Which option is derived from the discovery component of FireSIGHT technology?

    A. connection event table view

    B. network profile

    C. host profile

    D. authentication objects

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 500-285 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.