Chapter 4


"Do I Know This Already?" Quiz

1.

A

2.

E

3.

B

4.

D

5.

C

6.

B

7.

C

8.

A

9.

B

10.

C

Q&A

1.

What must you do before you can manage or configure your sensor across the network?

[click here]

Answer: Before you can manage or configure your sensor across the network, you must configure which hosts are allowed to access the sensor.

2.

What roles can you assign to a user account on your sensor?

[click here]

Answer: When creating user accounts on your sensor, you can assign one of the following roles: Administrator, Operator, Viewer, or Service.

3.

Which user role can be assigned to only a single user account?

[click here]

Answer: The Service role can be assigned to only a single user account on your sensor.

4.

What are the two ways that you can configure time on your sensor?

[click here]

Answer: You can configure time manually on your sensor, or you can configure the sensor to retrieve time automatically via an NTP server.

5.

When configuring your summertime settings, what are the two date formats that you can use?

[click here]

Answer: When configuring the summertime settings on your sensor, you can enter specific dates or specify recurring dates.

6.

What fields should you use to specify recurring dates?

[click here]

Answer: Recurring time-change dates are specified using the fields for the month, day of the month, and week of the month.

7.

What must you do before your sensor can initiate blocking via your infrastructure devices?

[click here]

Answer: Before your sensor can initiate blocking via your infrastructure devices, you must add the SSH public keys for those infrastructure devices.

8.

When editing a monitoring interface's parameters by using IDM, what parameters can you alter?

[click here]

Answer: When editing the characteristics of a monitoring interface by using IDM, you can alter the following parameters: interface description, interface speed, interface duplex, enabled status, and alternate TCP-reset interface.

9.

What are the three options for configuring inline software bypass?

[click here]

Answer: When configuring inline software bypass, you can choose Auto, On, or Off.

10.

How does the Auto software bypass mode work?

[click here]

Answer: Auto software bypass mode causes the sensor to bypass inspection when the analysis engine is stopped, thus preventing a network disruption.

11.

What is the Missed Packet Threshold?

[click here]

Answer: The Missed Packet Threshold specifies the percentage of packets that must be missed during the notification interval before a notification event is generated.

12.

How does the Off software bypass mode work?

[click here]

Answer: The Off software bypass mode causes the sensor to pass traffic only after it has been inspected by the analysis engine. If the analysis engine is stopped, traffic is not allowed to pass.

13.

Can you configure inline interface pairs and promiscuous interfaces to the same virtual sensor?

[click here]

Answer: Yes, you can assign inline interface pairs and promiscuous interfaces to the same virtual sensor.



CCSP IPS Exam Certification Guide
CCSP IPS Exam Certification Guide
ISBN: 1587201461
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Earl Carter

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net