A

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

Accelerator (XL) card 2nd 3rd
access
        CLI (command-line interface) 2nd
                console ports
                keyboars/ monitors
                SSH (Secure Shell) 2nd
                Telnet 2nd
        clients
                IDS MC installations 2nd
                Security Monitor 2nd
        restricting (attack response)
access attacks (network security)
access control lists
       VACLs (VLAN access control lists)
                ACEs (ACL entries) 2nd
                configuring
                configuring, Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th
                configuring, Catalyst operating system (OS) 2nd 3rd 4th 5th 6th
access control lists (ACLs)
       applying
                VLAN interfaces
        blocking
                compatibility
                existing
                manual configurations
                placement 2nd
       capture ports
                assigning
        creating 2nd 3rd
       interfaces
                blocking
       match clauses
                configuring 2nd
access maps
       VLAN
                action clauses
                action clauses;configuring 2nd
                applying to VLANs 2nd
                creating 2nd
                match clauses
                match clauses;configuring 2nd
accessing
        signatures via signature groups 2nd
                attack signatures 2nd
                L2/L3/L4 protocol signatures 2nd 3rd 4th
                OS signatures 2nd
                service signatures 2nd 3rd
accessList command
accounts
        user
                sensor appliances 2nd
       users
                privilege levels
                privilege levels, administrator
                privilege levels, changing
                privilege levels, operator
                privilege levels, service
                privilege levels, viewer
accounts. [See also user accounts]
ACEs (ACL entries)
        removing
ACL entries (ACEs)
        removing
ACLs (access control lists
       applying
                VLAN interfaces
ACLs (access control lists)
        blocking
                compatibility
                existing
                manual configurations
                placement 2nd
       capture ports
                assigning
        creating 2nd 3rd
       interfaces
                blocking
       match clauses
                configuring 2nd
action bars
        IDS MC interface
action clauses
        VLAN access maps
                configuring 2nd
action command 2nd
actions
        database rules 2nd
        event rules 2nd
       response
                triggered signatures 2nd
                triggers (signatures)
Actions (Display Preferences) 2nd
active defense systems 2nd
Add User page
        creating 2nd
addresses
        never-block (blocking configurations) 2nd
       target
                selecting signature engines
Admin tab sheet
        Database Rules option 2nd 3rd 4th 5th
        System Configuration option 2nd
administration
        Security Monitor
                Database Rules option 2nd 3rd 4th 5th
                Event Viewer Preferences 2nd 3rd
                System Configuration option 2nd
Administration tab sheet (IDM)
administrator privilege level
Administrator role (sensor user accounts)
Advisory related information option ( Related Vulnerability page)
Affected programs option (Related Vulnerability page)
Affected systems option (Related Vulnerability page)
alarm channels
        virtualAlarm 2nd
alarm counters
        parameters 2nd 3rd
alarm summarization
alarm throttling
        key master signature parameter 2nd
AlarmChannel process
AlarmDelayTimer master signature parameter
AlarmInterval master signature parameter
alarms
       logging
                blocking 2nd
       monitoring
                IEV (IDS Event Viewer)
        security levels
                high
                informational
                low
                medium
        viewing information (IEV)
AlarmSeverity master signature parameter
AlarmThrottle master signature parameter
AlarmThrottle parameter 2nd
AlarmTraits master signature parameter
alert events
        EventStore
Alias option (Related Vulnerability page)
allowed hosts
        IDS MC
anitvirus software
anomaly (profile-based) intrusion detection
answer keys
        practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th
        practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th
anti-evasive techniques
        signatures
antispoofing
Apache directory
application attacks (attack taxonomy) 2nd
application settings
       IEV (IDS Event Viewer)
                configuring 2nd
                Data Archival Setup 2nd
                Refresh Cycle 2nd
Application Settings command (Edit menu)
applications
        IDS (Intrustion Detection System) 2nd 3rd
        sensorApp 2nd
                processes, VirtualAlarm
                processes, VirtualSensor 2nd
Approver authorization role (CiscoWorks)
Approver user authentication role (CiscoWorks)
Argument option (Choose the Actions page)
AT address option (Enter Sensor Information page)
atomic signature engine category 2nd
        Atomic.ARP 2nd
        Atomic.ICMP 2nd
        Atomic.IPOptions 2nd
        Atomic.L3.IP 2nd
        Atomic.TCP 2nd 3rd
        Atomic.UDP 2nd
Atomic.ARP atomic signature engine 2nd
Atomic.ICMP atomic signature engine 2nd
Atomic.IPOptions atomic signature engine 2nd
Atomic.L3.IP atomic signature engine 2nd
Atomic.TCP atomic signature engine 2nd 3rd
Atomic.UDP atomic signature engine 2nd
attack responses 2nd
attack signatures
        accessing 2nd
attack taxonomy (network security) 2nd
        application attacks 2nd
        IP spoofing 2nd
        man-in-the-middle attacks
        management protocols 2nd 3rd
        packet sniffers 2nd
        password attacks 2nd
        viruses 2nd
attackers
        evasive detection techniques
                encryption
                flooding
                fragmentation
                obfuscation 2nd
attacks
        Layer 2 ARP
        Layer 3 ICMP
        Layer 3 IP option
        Loki
        many-to-many (n to n)
        many-to-one (n to 1)
        reconnaissance
        selecting signature engines
        signatures
        Stacheldraht
        TCP packets
attacks (network security)
        access
        DoS (denial-of-service) 2nd 3rd
        ICMP-based
        reconnaissance
authentication
        blocking
        CSACS (Cisco Secure Access Server)
        OTP (one-time-passwords)
        PIX Firewall
        PIX Firewall (blocking)
        RSA (Rivest Shamir Adleman)
       user roles
                CiscoWorks 2nd
authorization
       roles
                CiscoWorks 2nd
Auto collapse enabled option (Your Preferences page)
Auto query enabled option (Your Preferences page)
automatic blocks
        time limits
Automatic IP Logging page 2nd
automatic logging
        IDS MC 2nd 3rd 4th

[ LiB ]


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net