Chapter 18. Practice Exam 2

[ LiB ]  
Question 1

Which account can you use to perform all CLI functions on the sensor?

  • A. Service account

  • B. Administrator

  • C. Operator

  • D. Viewer

Question 2

What CLI command do you use to download updates to the sensor?

  • A. Download

  • B. Upgrade

  • C. Sync

  • D. FTP

Question 3

When a hacker is using the obfuscation method of attack, what statement best describes what the hacker is doing?

  • A. Disguising an attack using AppleTalk

  • B. Disguising an attack using control characters

  • C. Disguising an attack using numbers

  • D. Disguising an attack using colors

Question 4

What type of IDS uses pattern matching of packets to detect malicious activity?

  • A. Profile IDS

  • B. Cable sensing IDS

  • C. Signature-based IDS

  • D. Traffic monitoring IDS

Question 5

Which sequence is correct when you receive new updates?

  • A. Update the sensor and then update IDS MC.

  • B. Update the sensor and then update IDS IEV.

  • C. Update the IDS MC and then update the sensor.

  • D. Update the IDS MC and then update IDS IEV.

Question 6

Which two are signature engine parameters? (Choose two.)

  • A. Distant

  • B. Local

  • C. Global

  • D. Master

Question 7

Which two are methods of uploading service packs to a sensor? (Choose two.)

  • A. IDS IEV

  • B. IDS MC

  • C. Sensor CLI

  • D. IDS Sensor Upload Utility

Question 8

Which browser is supported for IDSM?

  • A. Opera version 3.1

  • B. Explorer 5.0

  • C. Netscape 4.79

  • D. Sun Solaris Web Traveler

Question 9

When installing IDS MC, what is the default Sybase database password?

  • A. cisco

  • B. netranger

  • C. attack

  • D. There is no default password.

Question 10

What are the names of the two partitions on the sensor? (Choose two.)

  • A. Application

  • B. Active

  • C. Backup

  • D. Recovery

Question 11

Which methods do you use to access the sensor? (Choose all that apply.)

  • A. Console connection

  • B. FTP

  • C. Telnet

  • D. SSH

Question 12

Which four of the following are possible EventAction s?

  • A. Record

  • B. Log

  • C. Restart

  • D. Reset

  • E. ShunHost

  • F. ZERO

  • G. Block

Question 13

What does the IDS_Analyzer process do in the IDS MC?

  • A. Generates all scheduled reports

  • B. Receives IDS alarm and syslog security events and stores them in the database

  • C. Retrieves notification requests from other subsystems and performs notification

  • D. Defines event rules and requests user -specified notification

Question 14

What does the IDS_Receiver process do in the IDS MC?

  • A. Generates all scheduled reports

  • B. Receives IDS alarm and syslog security events and stores them in the database

  • C. Retrieves notification requests from other subsystems and performs notification

  • D. Defines event rules and requests user-specified notification

Question 15

Which signature engine parameter cannot be changed for default signatures but can be changed for custom signatures?

  • A. Master

  • B. Protected

  • C. Unprotected

  • D. Variable

Question 16

Which statement is true about IDS log files?

  • A. They can be imported into IDS MC.

  • B. They can be imported into another sensor.

  • C. They can be imported into IEV.

  • D. They can be imported into IDM.

Question 17

Monitoring Center for Security supports which of the following? (Choose all that apply.)

  • A. Cisco IDS Sensors

  • B. Cisco PIX Firewalls

  • C. Cisco IOS Routers

  • D. Cisco Catalyst RSM

Question 18

On the IDS MC Server, which directory stores sensor updates?

  • A. \MDC\updates

  • B. \MDC\etc\ids

  • C. \MDC\etc\updates

  • D. \MDC\etc\ids\updates

Question 19

On the IDS MC Server, which directory is the home directory?

  • A. \MDC\ids

  • B. \MDC\

  • C. \ MC \

  • D. \IDSMC\

Question 20

On the IDS MC Server, in which directory is the Web server located?

  • A. \MDC\WebServer

  • B. \MDC\Apache

  • C. \MDC\IIS

  • D. \ISDMC\Apache

Question 21

Hackers can use Unicode, hex, or control characters to replace characters to evade detection by pattern-matching IDS signatures. What is this process called?

  • A. Hiding

  • B. Evasive techniques

  • C. Obfuscation

  • D. Message covering

Question 22

Which statement is incorrect about the IDSM-2 module?

  • A. It supports the recovery partition.

  • B. It does not support the recovery partition.

  • C. It supports signature-based detection.

  • D. It supports VLAN monitoring.

Question 23

Which command adds host keys to the sensor?

  • A. add host-key

  • B. ssh add-host

  • C. ssh host-key

  • D. host-key

Question 24

What port do you use when logging into the IDS MC?

  • A. 1741

  • B. 1714

  • C. 443

  • D. 80

Question 25

What is the communication channel used between the sensor and IDS MC?

  • A. Telnet

  • B. SSH

  • C. PostOffice

  • D. RDEP

Question 26

Which protocol is used between IEV and the IDS 4.0 sensor?

  • A. Telnet

  • B. SSH

  • C. PostOffice

  • D. RDEP

Question 27

Which protocol is used between the Security Monitor and the sensor?

  • A. Telnet

  • B. SSH

  • C. PostOffice

  • D. RDEP

Question 28

What features does the IDS MC provide? (Choose all that apply.)

  • A. Configure IOS sensors.

  • B. Upload alarms from sensors.

  • C. Push signature updates to sensors.

  • D. Import sensor configurations from other IDS management tools.

Question 29

Which processes are part of the IDS MC? (Choose three.)

  • A. IDS_Backup

  • B. IDS_DeployDaemon

  • C. IDS_Update

  • D. IDS_Sensor

  • E. IDS_WebServer

  • F. IDS_ReportScheduler

Question 30

What must you configure on managed devices? (Choose two.)

  • A. HTTP access

  • B. Telnet access

  • C. Enable password

  • D. FTP enabled

Question 31

What command does an IDS sensor use to block traffic on a PIX Firewall?

  • A. IP access-list

  • B. Shut

  • C. Block

  • D. IP Shun

Question 32

What signature engine can you use to detect attacks from BGP and EIGRP?

  • A. Atomic.TCP

  • B. String.TCP

  • C. Atomic.L3.IP

  • D. Atomic.ICMP

Question 33

What are the four severity levels of a sensor? (Choose four.)

  • A. Detected

  • B. Warning

  • C. Informational

  • D. High

  • E. Medium

  • F. Low

Question 34

Which signatures monitor OSI Layers 5, 6, and 7?

  • A. Atomic

  • B. Service

  • C. State.String

  • D. Flood

Question 35

Which signature engine parameter must be defined for all signatures?

  • A. Protected

  • B. Mandatory

  • C. Master

  • D. Required

Question 36

What two statements about StorageKey and SummaryKey are correct? (Choose two.)

  • A. The StorageKey parameter is for pre-alarm counters.

  • B. The StorageKey parameter is for post-alarm counters.

  • C. The SummaryKey parameter is for pre-alarm counters.

  • D. The SummaryKey parameter is for post-alarm counters.

Question 37

What does the MaxProto parameter do in the Atomic.L3.IP signature engine?

  • A. It defines the minimum IP protocol number.

  • B. It defines the range of IP protocol numbers.

  • C. It defines the maximum IP protocol number.

  • D. It is not a valid parameter.

Question 38

Which signature engine cannot be used to create custom signatures?

  • A. Atomic.L3.IP

  • B. String.TCP

  • C. Service.Generic

  • D. Trojan.UDP

Question 39

Which of the following methods can you use to update files on the IDS? (Choose three.)

  • A. HTTP/HTTPS

  • B. Telnet

  • C. SSH

  • D. RDEP

  • E. FTP

  • F. SCP

Question 40

What is the service pack level of IDS -K9-sp-4.0-2-S42.rpm.pkg ?

  • A. 4.0

  • B. 2

  • C. S42

  • D. 4.2

Question 41

Which CLI command creates a self-signed certificate for the IDS sensor?

  • A. generate cert

  • B. generate-key

  • C. host-key

  • D. tls generate-key

Question 42

What protocol is used between sensors and master blocking sensors?

  • A. Telnet

  • B. SSH

  • C. RDEP

  • D. SCP

Question 43

Which of the following are valid signature actions? (Choose four.)

  • A. Log

  • B. Informational

  • C. Reset

  • D. Block Host

  • E. FTP Reset

  • F. Block Connection

Question 44

Which statement is not true about master blocking sensors?

  • A. Master blocking sensors can use other master blocking sensors to control other devices.

  • B. Communication between sensors uses RDEP.

  • C. Master blocking sensors can handle block requests from multiple sensors.

  • D. Master blocking sensors can only be configured with IDS MC.

Question 45

What tool can you use to create SSH keys in IDS MC?

  • A. Sensors

  • B. IDS MC key-gen

  • C. PuTTyGen

  • D. ssh host-key

Question 46

Which of the following commands are correct when configuring a Catalyst 2900XL switch?

  • A. mls ip config

  • B. port monitor

  • C. monitor session

  • D. monitor ip

Question 47

What technology allows sensors to monitor switches?

  • A. Remote Session

  • B. SPAN

  • C. VSPAN

  • D. RSMA

Question 48

When configuring switches, what keyword will allow you to monitor both egress and ingress traffic?

  • A. rx

  • B. tx

  • C. both

  • D. rx-tx

Question 49

In what order should you execute the following commands to configure a single sensor and switch to monitor traffic?

  1. clear trunk

  2. set security acl

  3. set vlan

  4. set trunk

  • A. A, D, C, B

  • B. A, C, D, B

  • C. B, C, D, A

  • D. A, D, B, C

Question 50

What is the command to restore the sensor partition from the recovery partition?

  • A. Sensor(config)#recover application-partition

  • B. Sensor(config)#recover recovery-partition

  • C. Sensor(config)#recover back-partition

  • D. Sensor(config)#recover active-partition

[ LiB ]  


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net