Which two types of addresses can be blocked with BRF on the ASA? (Choose two)
A. instant messaging
B. ads
C. P2P
D. spyware
E. Games
Correct Answer: BD
Explanation/Reference:
Explanation:
Botnets are a collection of malicious software or "bots" covertly installed on endpoints and controlled by another entity through a communications channel such as IRC, peer-to-peer (P2P), or HTTP. The dynamic database includes the following types of addresses:
Ads – These are advertising networks that deliver banner ads, interstitials, rich media ads, pop- ups, and pop-unders for websites, spyware and adware. Some of these networks send ad- oriented HTML emails and email verification services.
Data Tracking – These are sources associated with companies and websites that offer data tracking and metrics services to websites and other online entities.
Some of these also run small advertising networks.
Spyware – These are sources that distribute spyware, adware, greyware, and other potentially unwanted advertising software. Some of these also run exploits to install such software. Malware – These are sources that use various exploits to deliver adware, spyware and other malware to victim computers. Some of these are associated with rogue online vendors and distributors of dialers which deceptively call premium-rate phone numbers.
Adult – These are sources associated with adult networks/services offering web hosting for adult content, advertising, content aggregation, registration & billing, and age verification. These may be tied to distribution of adware, spyware, and dialers.
Bot and Threat Networks – These are rogue systems that control infected computers. They are either systems hosted on threat networks or systems that are part of the botnet itself.
Explanation/Reference:
Explanation:
Botnets are a collection of malicious software or "bots" covertly installed on endpoints and controlled by another entity through a communications channel such as IRC, peer-to-peer (P2P), or HTTP. The dynamic database includes the following types of addresses:
Ads – These are advertising networks that deliver banner ads, interstitials, rich media ads, pop- ups, and pop-unders for websites, spyware and adware. Some of these networks send ad- oriented HTML emails and email verification services.
Data Tracking – These are sources associated with companies and websites that offer data tracking and metrics services to websites and other online entities.
Some of these also run small advertising networks.
Spyware – These are sources that distribute spyware, adware, greyware, and other potentially unwanted advertising software. Some of these also run exploits to install such software. Malware – These are sources that use various exploits to deliver adware, spyware and other malware to victim computers. Some of these are associated with rogue online vendors and distributors of dialers which deceptively call premium-rate phone numbers.
Adult – These are sources associated with adult networks/services offering web hosting for adult content, advertising, content aggregation, registration & billing, and age verification. These may be tied to distribution of adware, spyware, and dialers.
Bot and Threat Networks – These are rogue systems that control infected computers. They are either systems hosted on threat networks or systems that are part of the botnet itself.