[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]
Schedule options (Schedule Report page)
Schedule Report page 2nd
Scheduled option (Enter Job Properties page)
scheduled reports
Security Monitor 2nd 3rd
SCP (Secure Copy Protocol)
copy command
Script file option (Choose the Actions page)
script kiddies
secure communications
ssh-host command
Secure Copy Protocol (SCP)
copy command
Secure HTTP (HTTPS)
Secure Hypertext Transfer Protocol (HTTPS)
self-signed X.509 certificate
Secure Shell (SSH)
Secure Shell (SSh)
blocking devices
Secure Shell (SSH)
CLI (command-line interface) access 2nd
keys
existing 2nd
generating 2nd
Secure Shell (SSH) commands
ssh-authorized-key
ssh- generate-key 2nd
ssh-host 2nd 3rd
tls generate-key
security
CSACS (Cisco Secure Access Server)
firewalls
PIX (Private Internet Exchange)
sensor appliance placement 2nd
IDS (Intrusion Detection System)
applications 2nd 3rd
communications
communications;data extraction 2nd
communications;data extraction, event messages
communications;data extraction, IP log messages
communications;data extraction, PostOffice protocol 2nd
communications;data extraction, RDEP (Remote Data Exchange Protocol) 2nd
communications;managed devices 2nd
communications;management 2nd
connections
connections;cidWebServer 2nd
connections;NAC (Network Access Controller) 2nd
connections;sensorApp 2nd
connections;sensorApp, VirtualAlarm process
connections;sensorApp, VirtualSensor process 2nd
connections;Telnet
sensor user accounts 2nd
sensor user accounts, creating 2nd
sensor user accounts, practice exercises 2nd
sensor user accounts, roles 2nd 3rd 4th 5th 6th 7th
sensor user accounts, user status 2nd
SSH (Secure Shell)
NSDB (Network Security Database) 2nd
Related Vulnerability page 2nd 3rd
Signature Information page 2nd
User Notes page
passwords
OTP (one-time-passwords)
privilege levels
administrator
changing
operator
service
viewer
TLS (Transaction Layer Security)
Security Agent
security levels
alarms
high
informational
low
medium
security management
CSA MC (Cisco Security Agent Management)
IDM
IEV 2nd
VPN (Virtual Private Network)/VMS (Security Management Solution) 2nd
Security Management Solution (VMS) 2nd
Security Monitor
administration
Database Rules option 2nd 3rd 4th 5th
Event Viewer Preferences 2nd 3rd
System Configuration option 2nd
communication properties
configuring
connections, monitoring
devices, adding
devices, importing 2nd
devices, IOS 2nd
devices, RDEP 2nd
devices,PostOffice 2nd
events, monitoring 2nd 3rd 4th 5th 6th
statistics, monitoring 2nd 3rd
Event Viewer 2nd
columns , manipulating 2nd
Display Preferences
Display Preferences, Actions 2nd
Display Preferences, Boundaries
Display Preferences, Cells
Display Preferences, Database
Display Preferences, Sort By
drillsheets
events, resuming/suspending
graphs, creating 2nd
launching
options 2nd
events
pulling
features
installing 2nd
client access 2nd
Installation Wizard 2nd 3rd
login via CiscoWorks
adding users 2nd
launching
user authorization roles 2nd
reports
on-demand 2nd 3rd
scheduled 2nd 3rd
viewing
tab sheets 2nd
security. 2nd [See also network security] [See also network security]
Select Sensor Group page 2nd
self-signed X.509 certificate
generating
sensing
global configurations
internal networks
IP packet reassembly 2nd
sensing (int0) interface
IDS-4215 standalone sensor appliance 2nd
sensing interface level 2nd
sensor
names
changing
settings
configuring
sensor appliances
initializing
setup command 2nd 3rd 4th
user accounts 2nd
placements
standalone
IDS-4215 2nd 3rd
IDS-4235 2nd 3rd
IDS-4250 2nd
IDS-4250XL 2nd 3rd
upgrading 2nd 3rd 4th
preparations
preparations, IDS-4210/IDS-4220
preparations, IDS-4220-E/IDS-4230-FE
preparations, IDS-4235/IDS-4250
sensor applicances
placements
firewalls 2nd
interfaces
managing
multiple networks
sensor devices
adding
IEV (IDS Event Viewer)
IDS MC
adding 2nd 3rd 4th
existing SSH keys 2nd
SSH keys 2nd
Sensor Group command (Devices menu)
Sensor Group page
sensor groups
IDS MC
creating 2nd
Sensor Information page
Sensor IP address option (Device Properties dialog box)
sensor maintenance
image recovery
CLI (command-line interface) 2nd
naming update files 2nd
service pack updates 2nd
signature updates 2nd
software updates
IDS MC
IDS MC, network signatures 2nd
IDS MC, version updates
update installations
sensor modules
IDSM2 2nd 3rd
NM-CIDS 2nd
sensor monitoring ports
Sensor name option (Device Properties dialog box)
Sensor name option (Enter Sensor Information page) 2nd
sensor user accounts (IDS) 2nd
creating 2nd
practice exercises 2nd
roles 2nd 3rd 4th 5th 6th 7th
user status 2nd
Sensor, Add command (Devices menu)
sensorApp application 2nd
processes
VirtualAlarm
VirtualSensor 2nd
Sensors
blocking configuration 2nd
managed devices, Cisco Catalyst 6000 VACL 2nd 3rd
managed devices, Cisco IOS Routers 2nd 3rd 4th 5th
managed devices, Cisco PIX Firewall 2nd 3rd 4th
never-block addresses 2nd
sensors
blocking forwarding
configurations
deploying 2nd
deploying, generating configurations
deploying, pending configurations
deploying, submit configurations 2nd 3rd
debugging
events
continuous streaming 2nd
forwarding blocking 2nd
master blocking 2nd 3rd
configuring 2nd
rules 2nd
rebooting/shutting down
system clocks
setting
virtualSensor
Sensors, Add command (Devices menu)
server host keys
creating
Server Message Block (SMB)
decoding
servers
CSACS (Cisco Secure Access Server)
Event Server
FTP
files, uploading
IP Log Server
Transaction Server
service alarm-channel-configuration level 2nd 3rd 4th 5th
service packs
updating
CLI (command-line interface) 2nd
service privilege level
Service role (sensor user accounts) 2nd
Service signature engine category 2nd
Service.DNS
Service.FTP
Service.Generic
Service.HTTP
Service.IDENT
Service.MSSQL
Service.NTP
Service.RPC
Service.SMB 2nd
Service.SNMP
Service.SSH
service signatures
accessing 2nd 3rd
service virtual-sensor-configuration level 2nd
Service.DNS signature engine
Service.FTP signature engine
Service.Generic signature engine
Service.HTTP signature engine
Service.IDENT signature engine
Service.MSSQL signature engine
Service.NTP signature engine
Service.RPC signature engine
Service.SMB signature engine 2nd
Service.SNMP signature engine
Service.SSH signature engine
ServicePorts master signature parameter
services host configuration level 2nd 3rd 4th 5th
services host networkParams level 2nd 3rd 4th
services level configurations (Level 3) 2nd
NetworkAccess service level 2nd 3rd
service alarm-channel-configuration level 2nd 3rd 4th 5th
service virtual-sensor-configuration level 2nd
services host configuration level 2nd 3rd 4th 5th
WebServer service level 2nd
servlets
cidWebServer 2nd 3rd 4th
session log files (attack response)
set port dot1qtunnel command
set rspan destination command 2nd
set rspan source command 2nd
set security acl capture-ports command 2nd 3rd
set security acl ip command 2nd 3rd 4th
set security acl map command 2nd
set span command 2nd 3rd 4th
set trunk command 2nd
set vlan command 2nd 3rd
Setting the event expansion boundary option (Event Viewer)
Settings option (Enter Group Information page)
setup command 2nd 3rd
sensor settings
configuring 2nd 3rd 4th
seucrity
Transport Layer Security (TLS)
self-signed X.509 certificates
Severity level option (Related Vulnerability page)
show commands
show events
show interfaces 2nd 3rd
show statistics 2nd 3rd
show tech-support 2nd
show version 2nd
show events command
show interfaces command 2nd 3rd
show settings command 2nd 3rd
show statistics command 2nd 3rd
show tech-support command 2nd
show user all commands
show user commands 2nd
show users command 2nd
show verion command 2nd
shun command 2nd
shunning
shunning. [See blocking]
shutting down
sensors
SigComment master signature parameter
SIGID master signature parameter
SigName master signature parameter
signature
custom ICMP
creating
signature attacks
Signature description option (Signature Information page)
signature engines 2nd 3rd 4th
atomic category 2nd
Atomic.ARP 2nd
Atomic.ICMP 2nd
Atomic.IPOptions 2nd
Atomic.L3.IP 2nd
Atomic.TCP 2nd 3rd
Atomic.UDP 2nd
categories 2nd
flood category 2nd
Flood.Host.ICMP
Flood.Host.UDP 2nd
Flood.Net.Engine 2nd
OTHER 2nd
parameters
local 2nd 3rd 4th 5th
master 2nd 3rd 4th 5th
master, key parameters 2nd 3rd 4th 5th 6th 7th 8th
protected 2nd
required 2nd
selecting 2nd
Service category 2nd
Service.DNS
Service.FTP
Service.Generic
Service.HTTP
Service.IDENT
Service.MSSQL
Service.NTP
Service.RPC
Service.SMB 2nd
Service.SNMP
Service.SSH
State category
State.String
State.String.Ciscologin
State.String.Lprformat
State.String.SMTP
String category
parameters
Sweep category 2nd
Sweep.Host.ICMP 2nd
Sweep.Host.TCP 2nd
Sweep.Multi 2nd
Sweep.OTHER.TCP 2nd
Sweep.Port.TCP 2nd
Sweep.Port.UDP
Traffic.ICMP 2nd
Trojan category 2nd
signature groups
signature access 2nd
attack signatures 2nd
L2/L3/L4 protocol signatures 2nd 3rd 4th
OS signatures 2nd
service signatures 2nd 3rd
Signature Informationn page 2nd
Signature name option (Signature Information page)
Signature structure option (Signature Information page)
signature tuning
Signature type option (Signature Information page)
signature updates 2nd
signature-based (misuse) intrusion detection
pattern matching
stateful
SignatureHandler servlet
signatures
accessing via signature groups 2nd
attack signatures 2nd
L2/L3/L4 protocol signatures 2nd 3rd 4th
OS signatures 2nd
service signatures 2nd 3rd
alarm summarization
alarms
security levels
security levels, high
security levels, informational
security levels, low
security levels, medium
anti-evasive techniques
built-in 2nd
adjusting
classes
configuring 2nd
filter exceptions 2nd
signature filtering 2nd 3rd
signature response actions 2nd
custom 2nd
creating 2nd
enabling 2nd 3rd 4th
grouping
views
heuristic-based 2nd
modifying 2nd 3rd 4th
network intrusions 2nd 3rd
networks
updating 2nd
overview 2nd
profile-based (anomaly) intrustion detection
protocol
L2/L3/L4, accessing 2nd 3rd 4th
protocol decode-based analysis 2nd
regular expression (Regex) syntax 2nd 3rd 4th
resetting
default settings 2nd
selecting
blocking
signature-based (misuse) intrusion detection
pattern matching 2nd
string pattern matching 2nd 3rd 4th
subsignatures
threshold configuration
triggers
response actions
tuned
tuning
custom signatures 2nd
FTP logins 2nd
IP protocols 2nd
updating
CLI (command-line interface) 2nd
Security Monitor 2nd
SigStringInfo master signature parameter
sites. [See Web sites]
SMB (Server Message Block)
decoding
software
antivirus
Cisco IDS (Intrusion Detection System)
formats
layout/design 2nd 3rd
practice exams 2nd
question handling strategies 2nd 3rd 4th
resources
testing facilities 2nd
time management 2nd
PrepLogic Practice Exams, Preview Edition [italics]
buttons 2nd
contact information 2nd
Examination Score Report
Flash Review mode 2nd
installing
interface design
learning environment
Practice Test mode 2nd 3rd
question quality
removing
requirements 2nd
reviewing
simulation
time remaining
updating 2nd
updating (sensor maintenance)
IDS MC
IDS MC, network signatures 2nd
IDS MC, version updates
Solaris
IDS MC
installing 2nd
Sort By (Display Preferences)
Sort by option (Your Preferences page)
Source address option (Report Filtering page)
Source direction option (Report Filtering page)
source ports
configuring 2nd 3rd 4th 5th 6th
source sessions
configuring
RSPAN (Remote SPAN) 2nd
SPA (Cisco Secure Posture Assessment)
SPAN (Switched Port Analyzer) 2nd 3rd
configuring
switches
switches, 2900XL/3500XL 2nd
switches, 2950/3550 2nd
switches, 4000/4500/6500 2nd 3rd
creating
RSPAN (Remote SPAN) switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
Specify the Trigger Condition page 2nd
SSH (Secure Shell)
blocking devices
CLI (command-line interface) access 2nd
keys
existing 2nd
generating 2nd
SSH (Secure Shell) commands
ssh-authorized-key
ssh-generate-key 2nd
ssh-host 2nd 3rd
tls generate-key
ssh-authorized-key command
ssh-generate-key command 2nd
ssh-host command 2nd 3rd
Stacheldraht attacks
standalone sensor appliances
IDS-4215 2nd 3rd
IDS-4235 2nd 3rd
IDS-4250 2nd
IDS-4250XL 2nd 3rd
state machines
parameters
State signature engine category
State.String
State.String. Ciscologin
State.String.Lprformat
State.String.SMTP
State.String signature engine
State.String.Ciscologin signature engine
State.String.Lprformat signature engine
State.String.SMTP signature engine
stateful pattern matching
Statistic Graph
data
viewing 2nd
statistics
monitoring
Security Monitor 2nd 3rd
sensors 2nd 3rd
status
IP log contents 2nd
users
sensor user accounts (IDS) 2nd
StorageKey master signature parameter
StorageKey parameter (key master signatures) 2nd 3rd
streaming
continuous
events 2nd
StreamReassembler servlet
string pattern matching
signatures 2nd 3rd 4th
String signature engine
parameters
structured threats
network security
Sub ID option (Signature Information page)
Subject option (Choose the Actions page) 2nd
submitting sensor configurations 2nd 3rd
Subnet mask option (Your Preferences page)
Subnet Mask value (Actions Display Preferences)
SubSig master signature parameter
subsignatures
summarization
alarms
key master signature parameter 2nd 3rd
Summarize summarization level (AlarmThrottle parameter)
SummaryKey master signature parameter
SummaryKey parameter (key master signatures) 2nd 3rd
Suspending and resuming new events option (Event Viewer)
Sweep signature engine 2nd
Sweep.Host.ICMP 2nd
Sweep.Host.TCP 2nd
Sweep.Multi 2nd
Sweep.OTHER.TCP 2nd
Sweep.Port.TCP 2nd
Sweep.Port.UDP
Sweep.Host.ICMP signature engine 2nd
Sweep.Host.TCP signature engine 2nd
Sweep.Multi signature engine 2nd
Sweep.OTHER.TCP signature engine 2nd
Sweep.Port.TCP signature engine 2nd
Sweep.Port.UDP signature engine
Switch IDS Module (IDSM2) 2nd
Switched Port Analyzer (SPAN) 2nd 3rd
configuring
switches
switches, 2900XL/3500XL 2nd
switches, 2950/3550 2nd
switches, 4000/4500/6500 2nd 3rd
creating
RSPAN (Remote SPAN)
switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
switches
6500 2nd
Catalyst advanced configurations 2nd
Catalyst advanced configurations, multiple sensor/multiple VLAN
Catalyst advanced configurations, single sensor/multiple VLAN
Catalyst advanced configurations, single sensor/single VLAN
Catalyst advanced configurations, trunk port configurations 2nd 3rd 4th
Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th
Catalyst IOS (Internetwork operating system) configurations
Catalyst operating system (OS) 2nd 3rd 4th 5th 6th
Catalyst operating system (OS) configurations 2nd 3rd 4th 5th
RSPAN (Remote SPAN) configurations
4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
SPAN configurations
2900XL/3500XL 2nd
2950/3550 2nd
4000/4500/6500 2nd 3rd
swtichport capture command 2nd
Sybase directory
Sybase SQL databases
passwords
IDS MC installations
syslog settings
configuring
Security Monitor
System Configuration option (Admin tab sheet) 2nd
Systems Administrator authorization role (CiscoWorks)
Systems Administrator user authentication role (CiscoWorks)
systemVariables
variable values
entering 2nd