|[ LiB ]|
|Question 1|| |
Which account can you use to perform all CLI functions on the sensor?
|Question 2|| |
What CLI command do you use to download updates to the sensor?
|Question 3|| |
When a hacker is using the obfuscation method of attack, what statement best describes what the hacker is doing?
|Question 4|| |
What type of IDS uses pattern matching of packets to detect malicious activity?
|Question 5|| |
Which sequence is correct when you receive new updates?
|Question 6|| |
Which two are signature engine parameters? (Choose two.)
|Question 7|| |
Which two are methods of uploading service packs to a sensor? (Choose two.)
|Question 8|| |
Which browser is supported for IDSM?
|Question 9|| |
When installing IDS MC, what is the default Sybase database password?
|Question 10|| |
What are the names of the two partitions on the sensor? (Choose two.)
|Question 11|| |
Which methods do you use to access the sensor? (Choose all that apply.)
|Question 12|| |
Which four of the following are possible EventAction s?
|Question 13|| |
What does the IDS_Analyzer process do in the IDS MC?
|Question 14|| |
What does the IDS_Receiver process do in the IDS MC?
|Question 15|| |
Which signature engine parameter cannot be changed for default signatures but can be changed for custom signatures?
|Question 16|| |
Which statement is true about IDS log files?
|Question 17|| |
Monitoring Center for Security supports which of the following? (Choose all that apply.)
|Question 18|| |
On the IDS MC Server, which directory stores sensor updates?
|Question 19|| |
On the IDS MC Server, which directory is the home directory?
|Question 20|| |
On the IDS MC Server, in which directory is the Web server located?
|Question 21|| |
Hackers can use Unicode, hex, or control characters to replace characters to evade detection by pattern-matching IDS signatures. What is this process called?
|Question 22|| |
Which statement is incorrect about the IDSM-2 module?
|Question 23|| |
Which command adds host keys to the sensor?
|Question 24|| |
What port do you use when logging into the IDS MC?
|Question 25|| |
What is the communication channel used between the sensor and IDS MC?
|Question 26|| |
Which protocol is used between IEV and the IDS 4.0 sensor?
|Question 27|| |
Which protocol is used between the Security Monitor and the sensor?
|Question 28|| |
What features does the IDS MC provide? (Choose all that apply.)
|Question 29|| |
Which processes are part of the IDS MC? (Choose three.)
|Question 30|| |
What must you configure on managed devices? (Choose two.)
|Question 31|| |
What command does an IDS sensor use to block traffic on a PIX Firewall?
|Question 32|| |
What signature engine can you use to detect attacks from BGP and EIGRP?
|Question 33|| |
What are the four severity levels of a sensor? (Choose four.)
|Question 34|| |
Which signatures monitor OSI Layers 5, 6, and 7?
|Question 35|| |
Which signature engine parameter must be defined for all signatures?
|Question 36|| |
What two statements about StorageKey and SummaryKey are correct? (Choose two.)
|Question 37|| |
What does the MaxProto parameter do in the Atomic.L3.IP signature engine?
|Question 38|| |
Which signature engine cannot be used to create custom signatures?
|Question 39|| |
Which of the following methods can you use to update files on the IDS? (Choose three.)
|Question 40|| |
What is the service pack level of IDS -K9-sp-4.0-2-S42.rpm.pkg ?
|Question 41|| |
Which CLI command creates a self-signed certificate for the IDS sensor?
|Question 42|| |
What protocol is used between sensors and master blocking sensors?
|Question 43|| |
Which of the following are valid signature actions? (Choose four.)
|Question 44|| |
Which statement is not true about master blocking sensors?
|Question 45|| |
What tool can you use to create SSH keys in IDS MC?
|Question 46|| |
Which of the following commands are correct when configuring a Catalyst 2900XL switch?
|Question 47|| |
What technology allows sensors to monitor switches?
|Question 48|| |
When configuring switches, what keyword will allow you to monitor both egress and ingress traffic?
|Question 49|| |
In what order should you execute the following commands to configure a single sensor and switch to monitor traffic?
|Question 50|| |
What is the command to restore the sensor partition from the recovery partition?
|[ LiB ]|