[ LiB ] |
Question 1 | Which account can you use to perform all CLI functions on the sensor?
|
Question 2 | What CLI command do you use to download updates to the sensor?
|
Question 3 | When a hacker is using the obfuscation method of attack, what statement best describes what the hacker is doing?
|
Question 4 | What type of IDS uses pattern matching of packets to detect malicious activity?
|
Question 5 | Which sequence is correct when you receive new updates?
|
Question 6 | Which two are signature engine parameters? (Choose two.)
|
Question 7 | Which two are methods of uploading service packs to a sensor? (Choose two.)
|
Question 8 | Which browser is supported for IDSM?
|
Question 9 | When installing IDS MC, what is the default Sybase database password?
|
Question 10 | What are the names of the two partitions on the sensor? (Choose two.)
|
Question 11 | Which methods do you use to access the sensor? (Choose all that apply.)
|
Question 12 | Which four of the following are possible EventAction s?
|
Question 13 | What does the IDS_Analyzer process do in the IDS MC?
|
Question 14 | What does the IDS_Receiver process do in the IDS MC?
|
Question 15 | Which signature engine parameter cannot be changed for default signatures but can be changed for custom signatures?
|
Question 16 | Which statement is true about IDS log files?
|
Question 17 | Monitoring Center for Security supports which of the following? (Choose all that apply.)
|
Question 18 | On the IDS MC Server, which directory stores sensor updates?
|
Question 19 | On the IDS MC Server, which directory is the home directory?
|
Question 20 | On the IDS MC Server, in which directory is the Web server located?
|
Question 21 | Hackers can use Unicode, hex, or control characters to replace characters to evade detection by pattern-matching IDS signatures. What is this process called?
|
Question 22 | Which statement is incorrect about the IDSM-2 module?
|
Question 23 | Which command adds host keys to the sensor?
|
Question 24 | What port do you use when logging into the IDS MC?
|
Question 25 | What is the communication channel used between the sensor and IDS MC?
|
Question 26 | Which protocol is used between IEV and the IDS 4.0 sensor?
|
Question 27 | Which protocol is used between the Security Monitor and the sensor?
|
Question 28 | What features does the IDS MC provide? (Choose all that apply.)
|
Question 29 | Which processes are part of the IDS MC? (Choose three.)
|
Question 30 | What must you configure on managed devices? (Choose two.)
|
Question 31 | What command does an IDS sensor use to block traffic on a PIX Firewall?
|
Question 32 | What signature engine can you use to detect attacks from BGP and EIGRP?
|
Question 33 | What are the four severity levels of a sensor? (Choose four.)
|
Question 34 | Which signatures monitor OSI Layers 5, 6, and 7?
|
Question 35 | Which signature engine parameter must be defined for all signatures?
|
Question 36 | What two statements about StorageKey and SummaryKey are correct? (Choose two.)
|
Question 37 | What does the MaxProto parameter do in the Atomic.L3.IP signature engine?
|
Question 38 | Which signature engine cannot be used to create custom signatures?
|
Question 39 | Which of the following methods can you use to update files on the IDS? (Choose three.)
|
Question 40 | What is the service pack level of IDS -K9-sp-4.0-2-S42.rpm.pkg ?
|
Question 41 | Which CLI command creates a self-signed certificate for the IDS sensor?
|
Question 42 | What protocol is used between sensors and master blocking sensors?
|
Question 43 | Which of the following are valid signature actions? (Choose four.)
|
Question 44 | Which statement is not true about master blocking sensors?
|
Question 45 | What tool can you use to create SSH keys in IDS MC?
|
Question 46 | Which of the following commands are correct when configuring a Catalyst 2900XL switch?
|
Question 47 | What technology allows sensors to monitor switches?
|
Question 48 | When configuring switches, what keyword will allow you to monitor both egress and ingress traffic?
|
Question 49 | In what order should you execute the following commands to configure a single sensor and switch to monitor traffic?
|
Question 50 | What is the command to restore the sensor partition from the recovery partition?
|
[ LiB ] |