Exam Prep Questions

[ LiB ]  
Question 1

Which browsers provide the minimum requirement needed to support the IDM Web interface? (Choose two.)

  • A. Netscape 4.79

  • B. MacWeb 4.8

  • C. Microsoft Internet Explorer 5.5 with SP2

  • D. Opera 4.1

A1:

Answers A and C are correct. The IDM Web interface minimum requirements are Netscape 4.79 and Explorer 5.5 with SP2 and higher. Answer B doesn't exist and is incorrect. Answer D is not supported and therefore is incorrect.

Question 2

Which is a component of IEV that provides details about signatures and vulnerabilities?

  • A. SigDB

  • B. IDS MC

  • C. Security Monitor

  • D. NSDB

A2:

Answer D is correct. The Network Security Database component of IEV provides signature and vulnerabilities information. Answer A does not exist and is incorrect. Answers B and C are separate management tools and not components of IEV, so they are incorrect.

Question 3

How do you add sensor devices to IEV?

  • A. Automatically detect them.

  • B. Manually add them.

  • C. Import them from Security Monitor.

  • D. Import them from a CSV file.

A3:

Answer B is correct. You manually add sensor devices to IEV. Answer A is incorrect. IEV cannot automatically detect sensors. Answer C is incorrect; the Security Monitor is separate product and does not allow IEV to import devices from it. Answer D is incorrect; you cannot use comma-separated value (CSV) files to import devices.

Question 4

What are the functions of the up and down arrow buttons in the second screen of the IEV View Wizard?

  • A. Help order the columns for display.

  • B. Help select the signature priority.

  • C. Move more important signatures to the top of the list.

  • D. These buttons don't exist in IEV View Wizard.

A4:

Answer A is correct. You use the up and down arrows to order the columns displayed in the alarm detail table. Therefore, Answers B, C, and D are incorrect.

Question 5

What functionality does the IEV have with regards to the sensor log files?

  • A. The sensor log files can be downloaded from the sensor to the IEV computer and then imported into the IEV database.

  • B. The sensor log files can be uploaded from the IEV database to the sensor.

  • C. IEV can export log files directly to the Security Monitor.

  • D. IEV is used for event monitoring and does not support sensor log files.

A5:

Answer A is correct. You use the IEV import sensor log files into the IEV database. Answer B is incorrect, because IEV does not upload log files to sensors. Answer C is incorrect; IEV is not compatible with Security Monitor in this fashion. Answer D is incorrect because IEV does work with log files.

Question 6

What is true about the events displayed in the Statistic Graph?

  • A. They reflect the true average number of alarms.

  • B. They do not reflect the true average number of alarms.

  • C. They display the statistics of all alarms on the sensor.

  • D. They display the average number of IP packets scanned.

A6:

Answer B is correct. The events in the Statistic Graph reflect the average number of alarms received by IEV, based on the filter that is applied to the data source. Therefore, depending on the filter, the Statistic Graph might not reflect the true average number of alarms. Answers A and C are basically the same answer, and both are incorrect. Answer D is incorrect; the Statistic Graph does not display all the IP packets scanned.

Question 7

What statements are true about filters in IEV? (Choose two.)

  • A. Events that match the filter criteria for exclusion are not displayed in a view.

  • B. Events that match the filter criteria for inclusion are not displayed in a view.

  • C. Events that match the filter criteria for inclusion are displayed in the view.

  • D. Events that match the filter criteria for exclusion are displayed in the view.

A7:

Answers A and C are correct. You use filters to select which events are included and are not included within a custom view. Events that match a filter for exclusion do not appear. Events that match a filter for inclusion do appear in the view. Answers B and D are incorrect because they state the exact opposite of how you use filters.

Question 8

What are the four alarm severities that IEV filters can use? (Choose four.)

  • A. Informational

  • B. Sweep

  • C. Attack

  • D. High

  • E. Medium

  • F. Reconnaissance

  • G. Low

A8:

Answers A, D, E, and G are correct. When creating filters, you use the four alarm severities to narrow which alarms you want to display or prevent displaying. Informational, Low, Medium, and High are the four possible selections. Answers B and F are types of attacks, not alarm severity levels, and are incorrect. Answer C is incorrect.

Question 9

What are the minimum recommended hardware requirements for IEV? (Choose three.)

  • A. Pentium II

  • B. Pentium III

  • C. 256MB RAM

  • D. 512MB RAM

  • E. 256MB disk space

  • F. 512MB disk space

A9:

Answers B, C, and F are correct. The minimum recommended hardware requirements for IEV are Pentium III 800MHz, 256MB of RAM, and at least 512MB of free disk space. Therefore, Answers A, D, and E are incorrect.

Question 10

If you want to view a continuous stream of events from the sensor, what do you use?

  • A. Realtime Digital Dashboard

  • B. Live Update Digital Dashboard

  • C. Realtime Dashboard

  • D. Live Update Dashboard

A10:

Answer C is correct. The Realtime Dashboard displays the most recent events received by the sensor in a continuous stream. Answers A, B, and C sound similar but do not exist. Therefore, they are incorrect.

[ LiB ]  


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net