The questions that follow give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in the appendix.
For more practice with exam-like question formats, use the exam engine on the CD-ROM.
What are the IDS evasion techniques?
What is the Target Value Rating?
What is event action override?
How can fragmentation be used to evade detection?
Which common obfuscation techniques are used by attackers?
What are some of the factors to consider when tuning your IPS sensors?
What are the global IP log sensor parameters?
What does it mean when the Max IP Log Bytes is configured to 0?
What must you do to use the signatures that are based on the AIC HTTP signature engine?
When configuring fragment reassembly on your sensor, which operating systems can you use when specifying the IP reassembly mode?
What is the difference between strict stream reassembly and loose stream reassembly?
What is an event action filter?
Which parameters can you specify when defining an event action filter?
What is the purpose of the Stop on Match parameter in the context of configuring an event action filter?
Why is the order of event action filters important?