[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]  
 Schedule options (Schedule Report page) 
 Schedule Report page 2nd 
 Scheduled option (Enter Job Properties page) 
 scheduled reports 
         Security Monitor 2nd 3rd 
 SCP (Secure Copy Protocol) 
         copy command 
 Script file option (Choose the Actions page) 
 script kiddies 
 secure communications 
         ssh-host command 
 Secure Copy Protocol (SCP) 
         copy command 
 Secure HTTP (HTTPS) 
 Secure Hypertext Transfer Protocol (HTTPS) 
         self-signed X.509 certificate 
 Secure Shell (SSH) 
 Secure Shell (SSh) 
         blocking devices 
 Secure Shell (SSH) 
         CLI (command-line interface) access 2nd 
        keys 
                 existing 2nd 
                 generating 2nd 
 Secure Shell (SSH) commands 
         ssh-authorized-key 
         ssh- generate-key 2nd 
         ssh-host 2nd 3rd 
         tls generate-key 
 security 
         CSACS (Cisco Secure Access Server) 
        firewalls 
                 PIX (Private Internet Exchange) 
                 sensor appliance placement 2nd 
         IDS (Intrusion Detection System) 
                 applications 2nd 3rd 
                 communications 
                 communications;data extraction 2nd 
                 communications;data extraction, event messages 
                 communications;data extraction, IP log messages 
                 communications;data extraction, PostOffice protocol 2nd 
                 communications;data extraction, RDEP (Remote Data Exchange Protocol) 2nd 
                 communications;managed devices 2nd 
                 communications;management 2nd 
                 connections 
                 connections;cidWebServer 2nd 
                 connections;NAC (Network Access Controller) 2nd 
                 connections;sensorApp 2nd 
                 connections;sensorApp, VirtualAlarm process 
                 connections;sensorApp, VirtualSensor process 2nd 
                 connections;Telnet 
                 sensor user accounts 2nd 
                 sensor user accounts, creating 2nd 
                 sensor user accounts, practice exercises 2nd 
                 sensor user accounts, roles 2nd 3rd 4th 5th 6th 7th 
                 sensor user accounts, user status 2nd 
                 SSH (Secure Shell) 
         NSDB (Network Security Database) 2nd 
                 Related Vulnerability page 2nd 3rd 
                 Signature Information page 2nd 
                 User Notes page 
        passwords 
                 OTP (one-time-passwords) 
         privilege levels 
                 administrator 
                 changing 
                 operator 
                 service 
                 viewer 
         TLS (Transaction Layer Security) 
 Security Agent 
 security levels 
         alarms 
                 high 
                 informational 
                 low 
                 medium 
 security management 
         CSA MC (Cisco Security Agent Management) 
         IDM 
         IEV 2nd 
         VPN (Virtual Private Network)/VMS (Security Management Solution) 2nd 
 Security Management Solution (VMS) 2nd 
 Security Monitor 
         administration 
                 Database Rules option 2nd 3rd 4th 5th 
                 Event Viewer Preferences 2nd 3rd 
                 System Configuration option 2nd 
         communication properties 
         configuring 
                 connections, monitoring 
                 devices, adding 
                 devices, importing 2nd 
                 devices, IOS 2nd 
                 devices, RDEP 2nd 
                 devices,PostOffice 2nd 
                 events, monitoring 2nd 3rd 4th 5th 6th 
                 statistics, monitoring 2nd 3rd 
         Event Viewer 2nd 
                 columns , manipulating 2nd 
                 Display Preferences 
                 Display Preferences, Actions 2nd 
                 Display Preferences, Boundaries 
                 Display Preferences, Cells 
                 Display Preferences, Database 
                 Display Preferences, Sort By 
                 drillsheets 
                 events, resuming/suspending 
                 graphs, creating 2nd 
                 launching 
                 options 2nd 
        events 
                 pulling 
         features 
         installing 2nd 
                 client access 2nd 
                 Installation Wizard 2nd 3rd 
         login via CiscoWorks 
                 adding users 2nd 
                 launching 
                 user authorization roles 2nd 
         reports 
                 on-demand 2nd 3rd 
                 scheduled 2nd 3rd 
                 viewing 
         tab sheets 2nd 
 security. 2nd [See also network security] [See also network security] 
 Select Sensor Group page 2nd 
 self-signed X.509 certificate 
         generating 
 sensing 
         global configurations 
                 internal networks 
                 IP packet reassembly 2nd 
 sensing (int0) interface 
         IDS-4215 standalone sensor appliance 2nd 
 sensing interface level 2nd 
 sensor 
         names 
                 changing 
        settings 
                 configuring 
 sensor appliances 
         initializing 
                 setup command 2nd 3rd 4th 
                 user accounts 2nd 
         placements 
         standalone 
                 IDS-4215 2nd 3rd 
                 IDS-4235 2nd 3rd 
                 IDS-4250 2nd 
                 IDS-4250XL 2nd 3rd 
         upgrading 2nd 3rd 4th 
                 preparations 
                 preparations, IDS-4210/IDS-4220 
                 preparations, IDS-4220-E/IDS-4230-FE 
                 preparations, IDS-4235/IDS-4250 
 sensor applicances 
        placements 
                 firewalls 2nd 
                 interfaces 
                 managing 
                 multiple networks 
 sensor devices 
        adding 
                 IEV (IDS Event Viewer) 
         IDS MC 
                 adding 2nd 3rd 4th 
                 existing SSH keys 2nd 
                 SSH keys 2nd 
 Sensor Group command (Devices menu) 
 Sensor Group page 
 sensor groups 
         IDS MC 
                 creating 2nd 
 Sensor Information page 
 Sensor IP address option (Device Properties dialog box) 
 sensor maintenance 
        image recovery 
                 CLI (command-line interface) 2nd 
         naming update files 2nd 
         service pack updates 2nd 
         signature updates 2nd 
        software updates 
                 IDS MC 
                 IDS MC, network signatures 2nd 
                 IDS MC, version updates 
         update installations 
 sensor modules 
         IDSM2 2nd 3rd 
         NM-CIDS 2nd 
 sensor monitoring ports 
 Sensor name option (Device Properties dialog box) 
 Sensor name option (Enter Sensor Information page) 2nd 
 sensor user accounts (IDS) 2nd 
         creating 2nd 
         practice exercises 2nd 
         roles 2nd 3rd 4th 5th 6th 7th 
         user status 2nd 
 Sensor, Add command (Devices menu) 
 sensorApp application 2nd 
        processes 
                 VirtualAlarm 
                 VirtualSensor 2nd 
 Sensors 
         blocking configuration 2nd 
                 managed devices, Cisco Catalyst 6000 VACL 2nd 3rd 
                 managed devices, Cisco IOS Routers 2nd 3rd 4th 5th 
                 managed devices, Cisco PIX Firewall 2nd 3rd 4th 
                 never-block addresses 2nd 
 sensors 
         blocking forwarding 
        configurations 
                 deploying 2nd 
                 deploying, generating configurations 
                 deploying, pending configurations 
                 deploying, submit configurations 2nd 3rd 
         debugging 
        events 
                 continuous streaming 2nd 
         forwarding blocking 2nd 
         master blocking 2nd 3rd 
                 configuring 2nd 
                 rules 2nd 
         rebooting/shutting down 
        system clocks 
                 setting 
         virtualSensor 
 Sensors, Add command (Devices menu) 
 server host keys 
         creating 
 Server Message Block (SMB) 
         decoding 
 servers 
         CSACS (Cisco Secure Access Server) 
         Event Server 
        FTP 
                 files, uploading 
         IP Log Server 
         Transaction Server 
 service alarm-channel-configuration level 2nd 3rd 4th 5th 
 service packs 
        updating 
                 CLI (command-line interface) 2nd 
 service privilege level 
 Service role (sensor user accounts) 2nd 
 Service signature engine category 2nd 
         Service.DNS 
         Service.FTP 
         Service.Generic 
         Service.HTTP 
         Service.IDENT 
         Service.MSSQL 
         Service.NTP 
         Service.RPC 
         Service.SMB 2nd 
         Service.SNMP 
         Service.SSH 
 service signatures 
         accessing 2nd 3rd 
 service virtual-sensor-configuration level 2nd 
 Service.DNS signature engine 
 Service.FTP signature engine 
 Service.Generic signature engine 
 Service.HTTP signature engine 
 Service.IDENT signature engine 
 Service.MSSQL signature engine 
 Service.NTP signature engine 
 Service.RPC signature engine 
 Service.SMB signature engine 2nd 
 Service.SNMP signature engine 
 Service.SSH signature engine 
 ServicePorts master signature parameter 
 services host configuration level 2nd 3rd 4th 5th 
 services host networkParams level 2nd 3rd 4th 
 services level configurations (Level 3) 2nd 
         NetworkAccess service level 2nd 3rd 
         service alarm-channel-configuration level 2nd 3rd 4th 5th 
         service virtual-sensor-configuration level 2nd 
         services host configuration level 2nd 3rd 4th 5th 
         WebServer service level 2nd 
 servlets 
         cidWebServer 2nd 3rd 4th 
 session log files (attack response) 
 set port dot1qtunnel command 
 set rspan destination command 2nd 
 set rspan source command 2nd 
 set security acl capture-ports command 2nd 3rd 
 set security acl ip command 2nd 3rd 4th 
 set security acl map command 2nd 
 set span command 2nd 3rd 4th 
 set trunk command 2nd 
 set vlan command 2nd 3rd 
 Setting the event expansion boundary option (Event Viewer) 
 Settings option (Enter Group Information page) 
 setup command 2nd 3rd 
        sensor settings 
                 configuring 2nd 3rd 4th 
 seucrity 
        Transport Layer Security (TLS) 
                 self-signed X.509 certificates 
 Severity level option (Related Vulnerability page) 
 show commands 
         show events 
         show interfaces 2nd 3rd 
         show statistics 2nd 3rd 
         show tech-support 2nd 
         show version 2nd 
 show events command 
 show interfaces command 2nd 3rd 
 show settings command 2nd 3rd 
 show statistics command 2nd 3rd 
 show tech-support command 2nd 
 show user all commands 
 show user commands 2nd 
 show users command 2nd 
 show verion command 2nd 
 shun command 2nd 
 shunning 
 shunning. [See blocking] 
 shutting down 
         sensors 
 SigComment master signature parameter 
 SIGID master signature parameter 
 SigName master signature parameter 
 signature 
        custom ICMP 
                 creating 
 signature attacks 
 Signature description option (Signature Information page) 
 signature engines 2nd 3rd 4th 
         atomic category 2nd 
                 Atomic.ARP 2nd 
                 Atomic.ICMP 2nd 
                 Atomic.IPOptions 2nd 
                 Atomic.L3.IP 2nd 
                 Atomic.TCP 2nd 3rd 
                 Atomic.UDP 2nd 
         categories 2nd 
         flood category 2nd 
                 Flood.Host.ICMP 
                 Flood.Host.UDP 2nd 
                 Flood.Net.Engine 2nd 
         OTHER 2nd 
         parameters 
                 local 2nd 3rd 4th 5th 
                 master 2nd 3rd 4th 5th 
                 master, key parameters 2nd 3rd 4th 5th 6th 7th 8th 
                 protected 2nd 
                 required 2nd 
         selecting 2nd 
         Service category 2nd 
                 Service.DNS 
                 Service.FTP 
                 Service.Generic 
                 Service.HTTP 
                 Service.IDENT 
                 Service.MSSQL 
                 Service.NTP 
                 Service.RPC 
                 Service.SMB 2nd 
                 Service.SNMP 
                 Service.SSH 
         State category 
                 State.String 
                 State.String.Ciscologin 
                 State.String.Lprformat 
                 State.String.SMTP 
         String category 
                 parameters 
         Sweep category 2nd 
                 Sweep.Host.ICMP 2nd 
                 Sweep.Host.TCP 2nd 
                 Sweep.Multi 2nd 
                 Sweep.OTHER.TCP 2nd 
                 Sweep.Port.TCP 2nd 
                 Sweep.Port.UDP 
         Traffic.ICMP 2nd 
         Trojan category 2nd 
 signature groups 
         signature access 2nd 
                 attack signatures 2nd 
                 L2/L3/L4 protocol signatures 2nd 3rd 4th 
                 OS signatures 2nd 
                 service signatures 2nd 3rd 
 Signature Informationn page 2nd 
 Signature name option (Signature Information page) 
 Signature structure option (Signature Information page) 
 signature tuning 
 Signature type option (Signature Information page) 
 signature updates 2nd 
 signature-based (misuse) intrusion detection 
         pattern matching 
                 stateful 
 SignatureHandler servlet 
 signatures 
         accessing via signature groups 2nd 
                 attack signatures 2nd 
                 L2/L3/L4 protocol signatures 2nd 3rd 4th 
                 OS signatures 2nd 
                 service signatures 2nd 3rd 
         alarm summarization 
         alarms 
                 security levels 
                 security levels, high 
                 security levels, informational 
                 security levels, low 
                 security levels, medium 
         anti-evasive techniques 
         built-in 2nd 
                 adjusting 
         classes 
         configuring 2nd 
                 filter exceptions 2nd 
                 signature filtering 2nd 3rd 
                 signature response actions 2nd 
         custom 2nd 
                 creating 2nd 
         enabling 2nd 3rd 4th 
        grouping 
                 views 
         heuristic-based 2nd 
         modifying 2nd 3rd 4th 
         network intrusions 2nd 3rd 
        networks 
                 updating 2nd 
         overview 2nd 
         profile-based (anomaly) intrustion detection 
        protocol 
                 L2/L3/L4, accessing 2nd 3rd 4th 
         protocol decode-based analysis 2nd 
         regular expression (Regex) syntax 2nd 3rd 4th 
        resetting 
                 default settings 2nd 
        selecting 
                 blocking 
         signature-based (misuse) intrusion detection 
                 pattern matching 2nd 
         string pattern matching 2nd 3rd 4th 
         subsignatures 
         threshold configuration 
        triggers 
                 response actions 
         tuned 
         tuning 
                 custom signatures 2nd 
                 FTP logins 2nd 
                 IP protocols 2nd 
        updating 
                 CLI (command-line interface) 2nd 
                 Security Monitor 2nd 
 SigStringInfo master signature parameter 
 sites. [See Web sites] 
 SMB (Server Message Block) 
         decoding 
 software 
         antivirus 
        Cisco IDS (Intrusion Detection System) 
                 formats 
                 layout/design 2nd 3rd 
                 practice exams 2nd 
                 question handling strategies 2nd 3rd 4th 
                 resources 
                 testing facilities 2nd 
                 time management 2nd 
         PrepLogic Practice Exams, Preview Edition [italics] 
                 buttons 2nd 
                 contact information 2nd 
                 Examination Score Report 
                 Flash Review mode 2nd 
                 installing 
                 interface design 
                 learning environment 
                 Practice Test mode 2nd 3rd 
                 question quality 
                 removing 
                 requirements 2nd 
                 reviewing 
                 simulation 
                 time remaining 
         updating 2nd 
        updating (sensor maintenance) 
                 IDS MC 
                 IDS MC, network signatures 2nd 
                 IDS MC, version updates 
 Solaris 
        IDS MC 
                 installing 2nd 
 Sort By (Display Preferences) 
 Sort by option (Your Preferences page) 
 Source address option (Report Filtering page) 
 Source direction option (Report Filtering page) 
 source ports 
         configuring 2nd 3rd 4th 5th 6th 
 source sessions 
        configuring 
                 RSPAN (Remote SPAN) 2nd 
 SPA (Cisco Secure Posture Assessment) 
 SPAN (Switched Port Analyzer) 2nd 3rd 
        configuring 
                 switches 
                 switches, 2900XL/3500XL 2nd 
                 switches, 2950/3550 2nd 
                 switches, 4000/4500/6500 2nd 3rd 
         creating 
         RSPAN (Remote SPAN) switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th 
 Specify the Trigger Condition page 2nd 
 SSH (Secure Shell) 
         blocking devices 
         CLI (command-line interface) access 2nd 
        keys 
                 existing 2nd 
                 generating 2nd 
 SSH (Secure Shell) commands 
         ssh-authorized-key 
         ssh-generate-key 2nd 
         ssh-host 2nd 3rd 
         tls generate-key 
 ssh-authorized-key command 
 ssh-generate-key command 2nd 
 ssh-host command 2nd 3rd 
 Stacheldraht attacks 
 standalone sensor appliances 
         IDS-4215 2nd 3rd 
         IDS-4235 2nd 3rd 
         IDS-4250 2nd 
         IDS-4250XL 2nd 3rd 
 state machines 
         parameters 
 State signature engine category 
         State.String 
         State.String. Ciscologin 
         State.String.Lprformat 
         State.String.SMTP 
 State.String signature engine 
 State.String.Ciscologin signature engine 
 State.String.Lprformat signature engine 
 State.String.SMTP signature engine 
 stateful pattern matching 
 Statistic Graph 
        data 
                 viewing 2nd 
 statistics 
        monitoring 
                 Security Monitor 2nd 3rd 
         sensors 2nd 3rd 
 status 
         IP log contents 2nd 
        users 
                 sensor user accounts (IDS) 2nd 
 StorageKey master signature parameter 
 StorageKey parameter (key master signatures) 2nd 3rd 
 streaming 
        continuous 
                 events 2nd 
 StreamReassembler servlet 
 string pattern matching 
         signatures 2nd 3rd 4th 
 String signature engine 
         parameters 
 structured threats 
         network security 
 Sub ID option (Signature Information page) 
 Subject option (Choose the Actions page) 2nd 
 submitting sensor configurations 2nd 3rd 
 Subnet mask option (Your Preferences page) 
 Subnet Mask value (Actions Display Preferences) 
 SubSig master signature parameter 
 subsignatures 
 summarization 
        alarms 
                 key master signature parameter 2nd 3rd 
 Summarize summarization level (AlarmThrottle parameter) 
 SummaryKey master signature parameter 
 SummaryKey parameter (key master signatures) 2nd 3rd 
 Suspending and resuming new events option (Event Viewer) 
 Sweep signature engine 2nd 
         Sweep.Host.ICMP 2nd 
         Sweep.Host.TCP 2nd 
         Sweep.Multi 2nd 
         Sweep.OTHER.TCP 2nd 
         Sweep.Port.TCP 2nd 
         Sweep.Port.UDP 
 Sweep.Host.ICMP signature engine 2nd 
 Sweep.Host.TCP signature engine 2nd 
 Sweep.Multi signature engine 2nd 
 Sweep.OTHER.TCP signature engine 2nd 
 Sweep.Port.TCP signature engine 2nd 
 Sweep.Port.UDP signature engine 
 Switch IDS Module (IDSM2) 2nd 
 Switched Port Analyzer (SPAN) 2nd 3rd 
        configuring 
                 switches 
                 switches, 2900XL/3500XL 2nd 
                 switches, 2950/3550 2nd 
                 switches, 4000/4500/6500 2nd 3rd 
         creating 
        RSPAN (Remote SPAN) 
                 switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th 
 switches 
         6500 2nd 
                 Catalyst advanced configurations 2nd 
                 Catalyst advanced configurations, multiple sensor/multiple VLAN 
                 Catalyst advanced configurations, single sensor/multiple VLAN 
                 Catalyst advanced configurations, single sensor/single VLAN 
                 Catalyst advanced configurations, trunk port configurations 2nd 3rd 4th 
                 Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th 
                 Catalyst IOS (Internetwork operating system) configurations 
                 Catalyst operating system (OS) 2nd 3rd 4th 5th 6th 
                 Catalyst operating system (OS) configurations 2nd 3rd 4th 5th 
        RSPAN (Remote SPAN) configurations 
                 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th 
         SPAN configurations 
                 2900XL/3500XL 2nd 
                 2950/3550 2nd 
                 4000/4500/6500 2nd 3rd 
 swtichport capture command 2nd 
 Sybase directory 
 Sybase SQL databases 
        passwords 
                 IDS MC installations 
 syslog settings 
        configuring 
                 Security Monitor 
 System Configuration option (Admin tab sheet) 2nd 
 Systems Administrator authorization role (CiscoWorks) 
 Systems Administrator user authentication role (CiscoWorks) 
 systemVariables 
        variable values 
                 entering 2nd