P

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

packet sniffers (attack taxonomy) 2nd
pages
       Edit Signatures
                options 2nd
panels
        Reassembly Options IDS 4
parameters
        signature engines
                local 2nd 3rd 4th 5th
                master 2nd 3rd 4th 5th
                master, key parameters 2nd 3rd 4th 5th 6th 7th 8th
                protected 2nd
                required 2nd
partitions
        recovery
password attacks (attack taxonomy) 2nd
password commands 2nd
Password option (Device Properties dialog box)
Password option (Enter Sensor Information page) 2nd
passwords
        changing 2nd
        CiscoWorks
        OTP (one-time-passwords)
        Sybase SQL databases (IDS MC installations)
path bars
        IDS MC interface
pattern matching
        protocol decode-based analysis 2nd
        strings (signatures) 2nd 3rd 4th
pattern matching intrusion detection 2nd
        stateful pattern matching
payload inspections
        selecting signature engines
PCI (Peripheral Component Interconnect) slots
        Accelerator (XL) card
Pending page
pending sensor configurations
Peripheral Component Interconnect (PCI) slots
        Accelerator (XL) card
permanent blocks
        time limits
PIX (Private Internet Exchange) Firewalls
PIX devices
       adding
                Security Monitor 2nd
PIX Firewall
        blocking configurations 2nd 3rd 4th
placing sensor appliances
        firewalls 2nd
        interfaces
        managing
        multiple networks
Port 1 interface
        IDSM2 sensor module
Port 2 interface
        IDSM2 sensor module
Port 7 interface
        IDSM2 sensor module
Port 8 interface
        IDSM2 sensor module
port monitor commands
ports
       console
                CLI (command-line interface) access
       destination
                assigning, VLANs 2nd
                configuring 2nd 3rd 4th 5th 6th
                VACL (VLAN access control lists)
       destination capture
                configuring
       monitoring
                assigning, VLANs
        sensor monitoring
       source
                configuring 2nd 3rd 4th 5th 6th
       target
                selecting signature engines
       trunk
                configuring
                configuring, destination capture ports
                configuring;adding VLANs 2nd
                configuring;assigning destination ports 2nd
                configuring;assigning monitoring ports
                configuring;clearing VLANs 2nd
       WebServer
                443
PostOffice devices
       adding
                Security Monitor 2nd
PostOffice protocol 2nd 3rd
practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
        answer key 2nd 3rd 4th 5th 6th 7th 8th 9th
practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
        answer key 2nd 3rd 4th 5th 6th 7th 8th 9th
Practice Test mode
        PrepLogic Practice Test, Preview Edition [italics] 2nd 3rd
Preferences
        Data Archival Setup 2nd
        Display Preferences
                Actions 2nd
                Boundaries
                Cells
                Database
                Sort By
preferences
        Event Viewer Preferences 2nd 3rd
Preferences
        Refresh Cycle 2nd
PrepLogic Practice Exams, Preview Edition [italics]
        buttons 2nd
        contact information 2nd
        Examination Score Report
        Flash Review mode 2nd
        installing
        interface design
        learning environment
        Practice Test mode 2nd 3rd
        question quality
        removing
        requirements 2nd
        reviewing
        simulation
        time remaining
Private Internet Exchange (PIX) Firewalls
privilege command 2nd
privilege commands
privilege levels
        administrator
        changing
        operator
        sensor user accounts (IDS) 2nd 3rd 4th 5th 6th 7th
        service
        viewer
privileged Exec CLI level (Level 1) 2nd
processes
        IDS MC 2nd
profile-based (anomaly) intrusion detection
prompts
       command-line
                changing
properties
       communication
                Security Monitor
protected parameters
        signature engines 2nd
protocol decode analysis
        Service signature engines
protocol decode-based analysis 2nd
Protocol master signature parameter
protocol signatures
       L2/L3/L4
                accessing 2nd 3rd 4th
protocols
        communication
                PostOffice protocol
                RDEP 2nd
       FTP (File Transfer Protocol)
                copy command
        HTTP (Hypertext Transfer Protocol)
        HTTPS (Secure HTTP)
       HTTPS (Secure Hypertext Transfer Protocol)
                self-signed X.509 certificate
       ICMP (Internet Control Message Protocol)
                security attacks
       IP
                signature tuning 2nd
        management (attack taxonomy) 2nd 3rd
       networks
                selecting signature engines
        PostOffice 2nd
        RDEP (Remote Data Exchange Protocol) 2nd 3rd
                allowed hosts
                encrypting
                settings
       SCP (Secure Copy Protocol)
                copy command
       TCP (Transmission Control Protocol)
                resetting (attack response)
       Transport Layer Security (TLS)
                self-signed X.509 certificates
proxy blockers. [See master blocking sensors]
Proxy login option (Add User page)
Proxy password option (Add User page)
PuTTY Configuration
PuTTY Key Generator dialog box
PuTTYgen
       Secure Shell (SSH) keys
                generating 2nd

[ LiB ]


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net