Chapter 7


"Do I Know This Already?" Quiz

1.

B

2.

D

3.

B

4.

D

5.

C

6.

A

7.

B

8.

C

9.

B

10.

C

Q&A

1.

Which two fields uniquely identify a signature?

[click here]

Answer: Together, the Signature ID and SubSignature ID uniquely identify a signature.

2.

What does the Signature Fidelity Rating indicate?

[click here]

Answer: The Signature Fidelity Rating indicates the likelihood that a signature will detect actual attack traffic without the sensor having specific knowledge about the target system's operating system and applications.

3.

What does the Alert Severity level indicate?

[click here]

Answer: The Alert Severity level indicates the relative seriousness of the traffic that the signature is designed to detect.

4.

What values can you assign to the Event Count Key field?

[click here]

Answer: You can assign the following values to the Event Count Key field: attacker address, attacker address and victim port, attacker and victim addresses, attacker and victim addresses and ports, or victim address.

5.

What does the Event Count Key specify?

[click here]

Answer: The Event Count Key specifies which IP address and or ports are used when determining unique instances of a signature's traffic.

6.

What is the Meta Event Generator?

[click here]

Answer: The Meta Event Generator enables you to create compound (meta) signatures based on multiple individual component signatures.

7.

When configuring a signature with the Meta signature engine, which engine-specific parameters do you need to specify?

[click here]

Answer: When defining a signature with the Meta signature engine, you need to define the signatures that comprise the meta signature, the number of unique victims needed to trigger the signature, the IP addresses or ports used to determine unique signature instances, and potentially whether the order of the component signatures is important.

8.

Explain Application Policy Enforcement and identify which signature engines support this capability.

[click here]

Answer: Application Policy Enforcement refers to the capability to provide deep-packet inspection for Layer 4 through Layer 7 for specific protocols, enabling a much more granular verification of your defined security policy. This functionality is provided by the AIC HTTP and AIC FTP signature engines.

9.

What are some of the checks provided by the AIC HTTP signature engine?

[click here]

Answer: The AIC HTTP signature engine provides functionality such as detection of covert tunneling through port 80, ensuring RFC compliance of HTTP methods, filtering traffic based on specified MIME types, and controlling permitted traffic based on user-defined policies.

10.

Signature tuning involves changing which signature parameters?

[click here]

Answer: Signature tuning involves changing the following signature parameters: engine-specific fields, event counter fields, and alert frequency fields.

11.

Signature tuning does not usually involve changing which signature parameters?

[click here]

Answer: Signature tuning does not usually involve enabling or disabling a signature, changing the alert severity, or assigning a signature action.

12.

What are the four high-level steps involved in creating a custom signature?

[click here]

Answer: When creating a custom signature, you need to perform the following tasks: choose a signature engine, verify existing functionality, define the signature parameters, and test the new signature's effectiveness.

13.

What are the factors that you need to consider when choosing a signature engine for a new signature?

[click here]

Answer: When choosing a signature engine for a new signature, you need to consider the following factors about the traffic being detected: network protocol, target address, target port, attack type, inspection criteria.

14.

What is the difference between adding a new signature and creating a new signature by using the cloning functionality?

[click here]

Answer: Using the cloning functionality enables you to initially populate a new signature with the values for an existing signature. This can save time when you are creating a new signature based on an existing signature.

15.

What regex matches the following patterns: ABXDF, ABXXDF, and ABD?

[click here]

Answer: A regex that detects ABXDF, ABXXF, and ABD is AB[X]*D[F]*. The asterisk (*) enables those patterns to occur 0 or more times. With the patterns specified, you could have also specified [D]+ to allow one or more Ds, since it is not clear from the patterns if more than one D is allowed.



CCSP IPS Exam Certification Guide
CCSP IPS Exam Certification Guide
ISBN: 1587201461
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Earl Carter

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net