|[ LiB ]|
|Question 1|| |
Which browsers provide the minimum requirement needed to support the IDM Web interface? (Choose two.)
Answers A and C are correct. The IDM Web interface minimum requirements are Netscape 4.79 and Explorer 5.5 with SP2 and higher. Answer B doesn't exist and is incorrect. Answer D is not supported and therefore is incorrect.
|Question 2|| |
Which is a component of IEV that provides details about signatures and vulnerabilities?
Answer D is correct. The Network Security Database component of IEV provides signature and vulnerabilities information. Answer A does not exist and is incorrect. Answers B and C are separate management tools and not components of IEV, so they are incorrect.
|Question 3|| |
How do you add sensor devices to IEV?
Answer B is correct. You manually add sensor devices to IEV. Answer A is incorrect. IEV cannot automatically detect sensors. Answer C is incorrect; the Security Monitor is separate product and does not allow IEV to import devices from it. Answer D is incorrect; you cannot use comma-separated value (CSV) files to import devices.
|Question 4|| |
What are the functions of the up and down arrow buttons in the second screen of the IEV View Wizard?
Answer A is correct. You use the up and down arrows to order the columns displayed in the alarm detail table. Therefore, Answers B, C, and D are incorrect.
|Question 5|| |
What functionality does the IEV have with regards to the sensor log files?
Answer A is correct. You use the IEV import sensor log files into the IEV database. Answer B is incorrect, because IEV does not upload log files to sensors. Answer C is incorrect; IEV is not compatible with Security Monitor in this fashion. Answer D is incorrect because IEV does work with log files.
|Question 6|| |
What is true about the events displayed in the Statistic Graph?
Answer B is correct. The events in the Statistic Graph reflect the average number of alarms received by IEV, based on the filter that is applied to the data source. Therefore, depending on the filter, the Statistic Graph might not reflect the true average number of alarms. Answers A and C are basically the same answer, and both are incorrect. Answer D is incorrect; the Statistic Graph does not display all the IP packets scanned.
|Question 7|| |
What statements are true about filters in IEV? (Choose two.)
Answers A and C are correct. You use filters to select which events are included and are not included within a custom view. Events that match a filter for exclusion do not appear. Events that match a filter for inclusion do appear in the view. Answers B and D are incorrect because they state the exact opposite of how you use filters.
|Question 8|| |
What are the four alarm severities that IEV filters can use? (Choose four.)
Answers A, D, E, and G are correct. When creating filters, you use the four alarm severities to narrow which alarms you want to display or prevent displaying. Informational, Low, Medium, and High are the four possible selections. Answers B and F are types of attacks, not alarm severity levels, and are incorrect. Answer C is incorrect.
|Question 9|| |
What are the minimum recommended hardware requirements for IEV? (Choose three.)
Answers B, C, and F are correct. The minimum recommended hardware requirements for IEV are Pentium III 800MHz, 256MB of RAM, and at least 512MB of free disk space. Therefore, Answers A, D, and E are incorrect.
|Question 10|| |
If you want to view a continuous stream of events from the sensor, what do you use?
Answer C is correct. The Realtime Dashboard displays the most recent events received by the sensor in a continuous stream. Answers A, B, and C sound similar but do not exist. Therefore, they are incorrect.
|[ LiB ]|