What is a false positive?
Answer: A false positive happens when a signature triggers incorrectly during normal user traffic instead of attack traffic.
What is a true positive?
Answer: A true positive happens when a signature correctly identifies an attack launched against the network.
If your sensor has only two monitoring interfaces, can you operate in promiscuous and inline modes simultaneously?
Answer: No, because running inline requires a pair of sensor interfaces. If you have only two interfaces, you can run either a single interface pair (in inline mode) or two interfaces (in promiscuous mode).
What factors are use to calculate the risk rating?
Answer: The risk rating is based on the event severity, the signature fidelity, and the target's asset value.
How is the asset value of a target configured?
Answer: You configure the asset value of a target by assigning one of the following values to an IP address or range of address: low, medium, high, mission critical, or no value.
Which appliance sensors support the inline mode of operation?
Answer: Inline mode is supported on the following appliance sensors: IDS 4215, IDS 4235, IDS 4240, IDS 4250, and IDS 4255.
Which appliance sensors are diskless?
Answer: The IDS 4240 and IDS 4255 appliance sensors are diskless.
Which appliance sensor comes with dual 1 Gb monitoring interfaces?
Answer: The IDS 4250XL comes with dual 1 Gb monitoring interfaces.
What are the three modes that you can configure for software bypass when using inline mode?
Answer: When using inline mode, you can configure software bypass to one of the following modes: auto, off, or on.
If you want the sensor to fail close when operating in inline mode, what software bypass mode would you use?
Answer: To cause a sensor running in inline mode to fail close, you need to configure the software bypass to off.
What are the four network boundaries that you need to consider when deploying sensors on your network?
Answer: When deploying sensors on your network, you need to consider the following network boundaries: Internet, intranets, extranets, and remote access.
What factors (besides network boundaries) must you consider when deploying your sensors?
Answer: When deploying your sensors, you must consider the following factors: sensor placement, sensor management and monitoring, number of sensors, and external sensor communications.
Which XML-based protocol does your sensor use to transfer event messages to other Cisco IPS devices?
Answer: Your sensor uses RDEP to transfer event messages to other Cisco IPS devices.
Which standard provides a product-independent standard for communicating security device events?
Answer: SDEE defines a product-independent standard for communicating security events.
What is a true negative?
Answer: A true negative is a situation in which a signature does not fire during normal user traffic on the network.
What is the Meta-Event Generator (MEG)?
Answer: The MEG is a signature engine that enables you to construct meta signatures that are based on correlating distinct individual signatures. Using the MEG, you can construct signatures that trigger only when specific individual signatures all trigger within a specific time period.
What is the main difference between intrusion detection and intrusion prevention?
Answer: Intrusion detection passively captures traffic looking for intrusive activity. Intrusion prevention operates in inline mode when examining network traffic, enabling intrusion prevention to actively drop intrusive activity.