The questions that follow give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in the appendix.
For more practice with exam-like question formats, use the exam engine on the CD-ROM.
What are the five CiscoWorks user roles that are relevant to IDS MC and Security Monitor operations?
What is the minimum amount of RAM and virtual memory recommended for a Windows server running Security Monitor?
What is the minimum amount of RAM and virtual memory recommended for a Windows client system used to connect to Security Monitor?
Which two browsers are supported for use by the Windows-based Security Monitor client systems?
What types of devices can you monitor with Security Monitor?
What are the two major protocols used to communicate between Security Monitor and IDS/IPS devices?
Which parameters can you use to configure event rules?
What actions can an event rule initiate?
What are the four tasks that you need to perform when adding an event rule?
What device statistical categories can you view using Security Monitor?
What are your two options when deleting rows from the Event Viewer, and how are they different?
What is the default expansion boundary?
Which report template would you use to find out which systems have launched the most attacks against your network in a specified time period?
What icons are used to indicate alarm severity?
What does the Blank Left check box do when configured as your cell preference?