N

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

n to 1 attacks ( many-to-one )
n to n attacks (many-to-many)
NAC
        block actions 2nd
NAC (Network Access Controller) 2nd
names
       sensors
                changing
naming
        update files 2nd
        views
NAT address option (Enter Sensor Information page)
navigation
        IEV (IDS Event Viewer)
                alarm information, viewing
                Expand Whole Details option
                views, closing
                views, columns 2nd
                views, creating 2nd
                views, data sources
                views, deleting
                views, displaying
                views, naming
                views, Realtime Dashboard 2nd
                views, Realtime Graph data 2nd
                views, signature grouping
                views, Statistic Graph data 2nd
NetRangers. [See standalone sensor appliances]
Network Access Controller (NAC) 2nd
Network Administrator authorization role (CiscoWorks)
Network Administrator user authentication role (CiscoWorks)
network intrusions
        false negatives
        false positives
        signatures 2nd 3rd
                heuristic-based 2nd
                profile-based (anomaly) intrustion detection
                protocol decode-based analysis 2nd
                signature-based (misuse) intrusion detection
                signature-based (misuse) intrusion detection, pattern matching 2nd
network intrustions
        false negatives
        false positives
Network Operator authorization role (CiscoWorks)
Network Operator user authentication role (CiscoWorks)
network protocols
        selecting signature engines
network security 2nd 3rd 4th
        active defense system 2nd
        attack management protocols 2nd 3rd
        attack responses 2nd
        attack taxonomy 2nd
                application attacks 2nd
                IP spoofing 2nd
                man-in-the-middle attacks
                packet sniffers 2nd
                password attacks 2nd
                viruses 2nd
        attacks
                access
                DoS (denial-of-service) 2nd 3rd
                ICMP-based
                reconnaissance
        Cisco Security Wheel 2nd
                steps
                steps, environment monitoring
                steps, environment security
                steps, environment testing
                steps, security policy improvement
        Cisco Threat Response
        external threats
        HIPS (host-focused intrusion protection system) 2nd 3rd
                CSA MC (Cisco Securty Agent Management Center)
                Security Agent
        internal threats
        management
                CSA MC (Cisco Security Agent Management)
                IDM
                IEV 2nd
                VPN (Virtual Private Network)/VMS (Security Management Solution) 2nd
        NIDS (network-focused intrusion detection) 2nd 3rd 4th
                4200 Series Sensor Appliances
                Firewall Sensor PIX (Private Internet Exchange) IDS
                Router Sensor IOS (Internetwork Operating System) IDS
                Switch Sensor IDS Module (IDSM2) 2nd
        structured threats
        triggers 2nd
                heuristic-based signatures 2nd
                profile-based (anomaly) intrusion detection
                protocol decode-based analysis 2nd
                signature-based (misuse) intrusion detection
                signature-based (misuse) intrusion detection, pattern matching
                signature-based (misuse) intrusion detection, stateful pattern matching
        unstructured threats
Network Security Database (NSDB) 2nd
        Related Vulnerability page 2nd 3rd
        Signature Information page 2nd
        User Notes page
network security policy
        functions 2nd
        RFC 2196 [quote]Site Security Handbook[quote]
Network Settings dialog box
network signatures
       updating
                Security Monitor
network topologies
        blocking
network-focused intrusion detection (NIDS) 2nd 3rd 4th
        4200 Series Sensor Appliances
        Firewall Sensor PIX (Private Internet Exchange) IDS
        Router Sensor IOS (Internetwork Operating System) IDS
        Switch IDS Module (IDSM2) 2nd
NetworkAccess service level 2nd 3rd
networkParams option (services host configuration level)
networks
       entry points
                blocking
       internal
                global sensing configurations
       multiple
                sensor applicance placement
       signatures
                updating 2nd
never-block addresses (blocking configurations) 2nd
New, Devices command (File menu)
New, Filter command (File menu)
New, View command (File menu)
NIDS (network-focused intrusion detection) 2nd 3rd 4th
        4200 Series Sensor Appliances
        Firewall Sensor PIX (Private Internet Exchange) IDS
        Router Sensor IOS (Internetwork Operating System) IDS
        Switch Sensor IDS Module (IDSM2) 2nd
NM-CIDS sensor module 2nd
no shutdown command
Notifiy via email option (Choose the Actions page)
NSDB (Network Security Database) 2nd
        Related Vulnerability page 2nd 3rd
        Signature Information page 2nd
        User Notes page
Number of IP log files option (Automatic IP Logging page)

[ LiB ]


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net