ExamGecko
Question list
Search
Search

Related questions











Question 260 - 300-710 discussion

Report
Export

A security engineer must configure policies tor a recently deployed Cisco FTD. The security policy for the company dictates that when five or more connections from external sources are initiated within 2 minutes, there is cause for concern. Which type of policy must be configured in Cisco FMC \z generate an alert when this condition is triggered?

A.

application detector

Answers
A.

application detector

B.

access control

Answers
B.

access control

C.

intrusion

Answers
C.

intrusion

D.

correlation

Answers
D.

correlation

Suggested answer: D

Explanation:

A correlation policy is a feature that allows you to respond in real time to threats or specific conditions on your network, using correlation rules.A correlation rule can trigger when the system generates a specific type of event, or when your network traffic deviates from its normal profile1.When a correlation rule triggers, the system generates a correlation event and can also launch a response, such as sending an alert, blocking an IP address, or scanning a host1.

In this case, the security engineer can configure a correlation rule that triggers when the system detects five or more connections from external sources within 2 minutes. The engineer can also configure a response that sends an alert to the FMC or an email recipient when this condition is triggered.The engineer can then create a correlation policy that includes this rule and activate it on the FTD device1.

The other options are incorrect because:

An application detector is a feature that allows you to detect web applications, clients, and application protocols based on patterns in network traffic.An application detector does not generate alerts based on the number of connections from external sources2.

An access control policy is a feature that allows you to control traffic flow through your network and inspect traffic for intrusions, malware, and files.An access control policy does not generate alerts based on the number of connections from external sources3.

An intrusion policy is a feature that allows you to detect and prevent malicious network activity using Snort rules.An intrusion policy does not generate alerts based on the number of connections from external sources4.

asked 07/10/2024
Giulia Maggio
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first