The questions that follow pose a greater challenge than the exam questions, because these use an open-ended format. By reviewing now with this more difficult question format, you can better exercise your memory and prove your conceptual understanding of this chapter. The answers to these questions are found in the appendix.
For more practice with exam-like question formats, use the exam engine on the CD-ROM.
What is a false positive?
What is a true positive?
If your sensor has only two monitoring interfaces, can you operate in promiscuous and inline modes simultaneously?
What factors are use to calculate the risk rating?
How is the asset value of a target configured?
Which appliance sensors support the inline mode of operation?
Which appliance sensors are diskless?
Which appliance sensor comes with dual 1 Gb monitoring interfaces?
What are the three modes that you can configure for software bypass when using inline mode?
If you want the sensor to fail close when operating in inline mode, what software bypass mode would you use?
What are the four network boundaries that you need to consider when deploying sensors on your network?
What factors (besides network boundaries) must you consider when deploying your sensors?
Which XML-based protocol does your sensor use to transfer event messages to other Cisco IPS devices?
Which standard provides a product-independent standard for communicating security device events?
What is a true negative?
What is the Meta-Event Generator (MEG)?
What is the main difference between intrusion detection and intrusion prevention?