S

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

Schedule options (Schedule Report page)
Schedule Report page 2nd
Scheduled option (Enter Job Properties page)
scheduled reports
        Security Monitor 2nd 3rd
SCP (Secure Copy Protocol)
        copy command
Script file option (Choose the Actions page)
script kiddies
secure communications
        ssh-host command
Secure Copy Protocol (SCP)
        copy command
Secure HTTP (HTTPS)
Secure Hypertext Transfer Protocol (HTTPS)
        self-signed X.509 certificate
Secure Shell (SSH)
Secure Shell (SSh)
        blocking devices
Secure Shell (SSH)
        CLI (command-line interface) access 2nd
       keys
                existing 2nd
                generating 2nd
Secure Shell (SSH) commands
        ssh-authorized-key
        ssh- generate-key 2nd
        ssh-host 2nd 3rd
        tls generate-key
security
        CSACS (Cisco Secure Access Server)
       firewalls
                PIX (Private Internet Exchange)
                sensor appliance placement 2nd
        IDS (Intrusion Detection System)
                applications 2nd 3rd
                communications
                communications;data extraction 2nd
                communications;data extraction, event messages
                communications;data extraction, IP log messages
                communications;data extraction, PostOffice protocol 2nd
                communications;data extraction, RDEP (Remote Data Exchange Protocol) 2nd
                communications;managed devices 2nd
                communications;management 2nd
                connections
                connections;cidWebServer 2nd
                connections;NAC (Network Access Controller) 2nd
                connections;sensorApp 2nd
                connections;sensorApp, VirtualAlarm process
                connections;sensorApp, VirtualSensor process 2nd
                connections;Telnet
                sensor user accounts 2nd
                sensor user accounts, creating 2nd
                sensor user accounts, practice exercises 2nd
                sensor user accounts, roles 2nd 3rd 4th 5th 6th 7th
                sensor user accounts, user status 2nd
                SSH (Secure Shell)
        NSDB (Network Security Database) 2nd
                Related Vulnerability page 2nd 3rd
                Signature Information page 2nd
                User Notes page
       passwords
                OTP (one-time-passwords)
        privilege levels
                administrator
                changing
                operator
                service
                viewer
        TLS (Transaction Layer Security)
Security Agent
security levels
        alarms
                high
                informational
                low
                medium
security management
        CSA MC (Cisco Security Agent Management)
        IDM
        IEV 2nd
        VPN (Virtual Private Network)/VMS (Security Management Solution) 2nd
Security Management Solution (VMS) 2nd
Security Monitor
        administration
                Database Rules option 2nd 3rd 4th 5th
                Event Viewer Preferences 2nd 3rd
                System Configuration option 2nd
        communication properties
        configuring
                connections, monitoring
                devices, adding
                devices, importing 2nd
                devices, IOS 2nd
                devices, RDEP 2nd
                devices,PostOffice 2nd
                events, monitoring 2nd 3rd 4th 5th 6th
                statistics, monitoring 2nd 3rd
        Event Viewer 2nd
                columns , manipulating 2nd
                Display Preferences
                Display Preferences, Actions 2nd
                Display Preferences, Boundaries
                Display Preferences, Cells
                Display Preferences, Database
                Display Preferences, Sort By
                drillsheets
                events, resuming/suspending
                graphs, creating 2nd
                launching
                options 2nd
       events
                pulling
        features
        installing 2nd
                client access 2nd
                Installation Wizard 2nd 3rd
        login via CiscoWorks
                adding users 2nd
                launching
                user authorization roles 2nd
        reports
                on-demand 2nd 3rd
                scheduled 2nd 3rd
                viewing
        tab sheets 2nd
security. 2nd [See also network security] [See also network security]
Select Sensor Group page 2nd
self-signed X.509 certificate
        generating
sensing
        global configurations
                internal networks
                IP packet reassembly 2nd
sensing (int0) interface
        IDS-4215 standalone sensor appliance 2nd
sensing interface level 2nd
sensor
        names
                changing
       settings
                configuring
sensor appliances
        initializing
                setup command 2nd 3rd 4th
                user accounts 2nd
        placements
        standalone
                IDS-4215 2nd 3rd
                IDS-4235 2nd 3rd
                IDS-4250 2nd
                IDS-4250XL 2nd 3rd
        upgrading 2nd 3rd 4th
                preparations
                preparations, IDS-4210/IDS-4220
                preparations, IDS-4220-E/IDS-4230-FE
                preparations, IDS-4235/IDS-4250
sensor applicances
       placements
                firewalls 2nd
                interfaces
                managing
                multiple networks
sensor devices
       adding
                IEV (IDS Event Viewer)
        IDS MC
                adding 2nd 3rd 4th
                existing SSH keys 2nd
                SSH keys 2nd
Sensor Group command (Devices menu)
Sensor Group page
sensor groups
        IDS MC
                creating 2nd
Sensor Information page
Sensor IP address option (Device Properties dialog box)
sensor maintenance
       image recovery
                CLI (command-line interface) 2nd
        naming update files 2nd
        service pack updates 2nd
        signature updates 2nd
       software updates
                IDS MC
                IDS MC, network signatures 2nd
                IDS MC, version updates
        update installations
sensor modules
        IDSM2 2nd 3rd
        NM-CIDS 2nd
sensor monitoring ports
Sensor name option (Device Properties dialog box)
Sensor name option (Enter Sensor Information page) 2nd
sensor user accounts (IDS) 2nd
        creating 2nd
        practice exercises 2nd
        roles 2nd 3rd 4th 5th 6th 7th
        user status 2nd
Sensor, Add command (Devices menu)
sensorApp application 2nd
       processes
                VirtualAlarm
                VirtualSensor 2nd
Sensors
        blocking configuration 2nd
                managed devices, Cisco Catalyst 6000 VACL 2nd 3rd
                managed devices, Cisco IOS Routers 2nd 3rd 4th 5th
                managed devices, Cisco PIX Firewall 2nd 3rd 4th
                never-block addresses 2nd
sensors
        blocking forwarding
       configurations
                deploying 2nd
                deploying, generating configurations
                deploying, pending configurations
                deploying, submit configurations 2nd 3rd
        debugging
       events
                continuous streaming 2nd
        forwarding blocking 2nd
        master blocking 2nd 3rd
                configuring 2nd
                rules 2nd
        rebooting/shutting down
       system clocks
                setting
        virtualSensor
Sensors, Add command (Devices menu)
server host keys
        creating
Server Message Block (SMB)
        decoding
servers
        CSACS (Cisco Secure Access Server)
        Event Server
       FTP
                files, uploading
        IP Log Server
        Transaction Server
service alarm-channel-configuration level 2nd 3rd 4th 5th
service packs
       updating
                CLI (command-line interface) 2nd
service privilege level
Service role (sensor user accounts) 2nd
Service signature engine category 2nd
        Service.DNS
        Service.FTP
        Service.Generic
        Service.HTTP
        Service.IDENT
        Service.MSSQL
        Service.NTP
        Service.RPC
        Service.SMB 2nd
        Service.SNMP
        Service.SSH
service signatures
        accessing 2nd 3rd
service virtual-sensor-configuration level 2nd
Service.DNS signature engine
Service.FTP signature engine
Service.Generic signature engine
Service.HTTP signature engine
Service.IDENT signature engine
Service.MSSQL signature engine
Service.NTP signature engine
Service.RPC signature engine
Service.SMB signature engine 2nd
Service.SNMP signature engine
Service.SSH signature engine
ServicePorts master signature parameter
services host configuration level 2nd 3rd 4th 5th
services host networkParams level 2nd 3rd 4th
services level configurations (Level 3) 2nd
        NetworkAccess service level 2nd 3rd
        service alarm-channel-configuration level 2nd 3rd 4th 5th
        service virtual-sensor-configuration level 2nd
        services host configuration level 2nd 3rd 4th 5th
        WebServer service level 2nd
servlets
        cidWebServer 2nd 3rd 4th
session log files (attack response)
set port dot1qtunnel command
set rspan destination command 2nd
set rspan source command 2nd
set security acl capture-ports command 2nd 3rd
set security acl ip command 2nd 3rd 4th
set security acl map command 2nd
set span command 2nd 3rd 4th
set trunk command 2nd
set vlan command 2nd 3rd
Setting the event expansion boundary option (Event Viewer)
Settings option (Enter Group Information page)
setup command 2nd 3rd
       sensor settings
                configuring 2nd 3rd 4th
seucrity
       Transport Layer Security (TLS)
                self-signed X.509 certificates
Severity level option (Related Vulnerability page)
show commands
        show events
        show interfaces 2nd 3rd
        show statistics 2nd 3rd
        show tech-support 2nd
        show version 2nd
show events command
show interfaces command 2nd 3rd
show settings command 2nd 3rd
show statistics command 2nd 3rd
show tech-support command 2nd
show user all commands
show user commands 2nd
show users command 2nd
show verion command 2nd
shun command 2nd
shunning
shunning. [See blocking]
shutting down
        sensors
SigComment master signature parameter
SIGID master signature parameter
SigName master signature parameter
signature
       custom ICMP
                creating
signature attacks
Signature description option (Signature Information page)
signature engines 2nd 3rd 4th
        atomic category 2nd
                Atomic.ARP 2nd
                Atomic.ICMP 2nd
                Atomic.IPOptions 2nd
                Atomic.L3.IP 2nd
                Atomic.TCP 2nd 3rd
                Atomic.UDP 2nd
        categories 2nd
        flood category 2nd
                Flood.Host.ICMP
                Flood.Host.UDP 2nd
                Flood.Net.Engine 2nd
        OTHER 2nd
        parameters
                local 2nd 3rd 4th 5th
                master 2nd 3rd 4th 5th
                master, key parameters 2nd 3rd 4th 5th 6th 7th 8th
                protected 2nd
                required 2nd
        selecting 2nd
        Service category 2nd
                Service.DNS
                Service.FTP
                Service.Generic
                Service.HTTP
                Service.IDENT
                Service.MSSQL
                Service.NTP
                Service.RPC
                Service.SMB 2nd
                Service.SNMP
                Service.SSH
        State category
                State.String
                State.String.Ciscologin
                State.String.Lprformat
                State.String.SMTP
        String category
                parameters
        Sweep category 2nd
                Sweep.Host.ICMP 2nd
                Sweep.Host.TCP 2nd
                Sweep.Multi 2nd
                Sweep.OTHER.TCP 2nd
                Sweep.Port.TCP 2nd
                Sweep.Port.UDP
        Traffic.ICMP 2nd
        Trojan category 2nd
signature groups
        signature access 2nd
                attack signatures 2nd
                L2/L3/L4 protocol signatures 2nd 3rd 4th
                OS signatures 2nd
                service signatures 2nd 3rd
Signature Informationn page 2nd
Signature name option (Signature Information page)
Signature structure option (Signature Information page)
signature tuning
Signature type option (Signature Information page)
signature updates 2nd
signature-based (misuse) intrusion detection
        pattern matching
                stateful
SignatureHandler servlet
signatures
        accessing via signature groups 2nd
                attack signatures 2nd
                L2/L3/L4 protocol signatures 2nd 3rd 4th
                OS signatures 2nd
                service signatures 2nd 3rd
        alarm summarization
        alarms
                security levels
                security levels, high
                security levels, informational
                security levels, low
                security levels, medium
        anti-evasive techniques
        built-in 2nd
                adjusting
        classes
        configuring 2nd
                filter exceptions 2nd
                signature filtering 2nd 3rd
                signature response actions 2nd
        custom 2nd
                creating 2nd
        enabling 2nd 3rd 4th
       grouping
                views
        heuristic-based 2nd
        modifying 2nd 3rd 4th
        network intrusions 2nd 3rd
       networks
                updating 2nd
        overview 2nd
        profile-based (anomaly) intrustion detection
       protocol
                L2/L3/L4, accessing 2nd 3rd 4th
        protocol decode-based analysis 2nd
        regular expression (Regex) syntax 2nd 3rd 4th
       resetting
                default settings 2nd
       selecting
                blocking
        signature-based (misuse) intrusion detection
                pattern matching 2nd
        string pattern matching 2nd 3rd 4th
        subsignatures
        threshold configuration
       triggers
                response actions
        tuned
        tuning
                custom signatures 2nd
                FTP logins 2nd
                IP protocols 2nd
       updating
                CLI (command-line interface) 2nd
                Security Monitor 2nd
SigStringInfo master signature parameter
sites. [See Web sites]
SMB (Server Message Block)
        decoding
software
        antivirus
       Cisco IDS (Intrusion Detection System)
                formats
                layout/design 2nd 3rd
                practice exams 2nd
                question handling strategies 2nd 3rd 4th
                resources
                testing facilities 2nd
                time management 2nd
        PrepLogic Practice Exams, Preview Edition [italics]
                buttons 2nd
                contact information 2nd
                Examination Score Report
                Flash Review mode 2nd
                installing
                interface design
                learning environment
                Practice Test mode 2nd 3rd
                question quality
                removing
                requirements 2nd
                reviewing
                simulation
                time remaining
        updating 2nd
       updating (sensor maintenance)
                IDS MC
                IDS MC, network signatures 2nd
                IDS MC, version updates
Solaris
       IDS MC
                installing 2nd
Sort By (Display Preferences)
Sort by option (Your Preferences page)
Source address option (Report Filtering page)
Source direction option (Report Filtering page)
source ports
        configuring 2nd 3rd 4th 5th 6th
source sessions
       configuring
                RSPAN (Remote SPAN) 2nd
SPA (Cisco Secure Posture Assessment)
SPAN (Switched Port Analyzer) 2nd 3rd
       configuring
                switches
                switches, 2900XL/3500XL 2nd
                switches, 2950/3550 2nd
                switches, 4000/4500/6500 2nd 3rd
        creating
        RSPAN (Remote SPAN) switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
Specify the Trigger Condition page 2nd
SSH (Secure Shell)
        blocking devices
        CLI (command-line interface) access 2nd
       keys
                existing 2nd
                generating 2nd
SSH (Secure Shell) commands
        ssh-authorized-key
        ssh-generate-key 2nd
        ssh-host 2nd 3rd
        tls generate-key
ssh-authorized-key command
ssh-generate-key command 2nd
ssh-host command 2nd 3rd
Stacheldraht attacks
standalone sensor appliances
        IDS-4215 2nd 3rd
        IDS-4235 2nd 3rd
        IDS-4250 2nd
        IDS-4250XL 2nd 3rd
state machines
        parameters
State signature engine category
        State.String
        State.String. Ciscologin
        State.String.Lprformat
        State.String.SMTP
State.String signature engine
State.String.Ciscologin signature engine
State.String.Lprformat signature engine
State.String.SMTP signature engine
stateful pattern matching
Statistic Graph
       data
                viewing 2nd
statistics
       monitoring
                Security Monitor 2nd 3rd
        sensors 2nd 3rd
status
        IP log contents 2nd
       users
                sensor user accounts (IDS) 2nd
StorageKey master signature parameter
StorageKey parameter (key master signatures) 2nd 3rd
streaming
       continuous
                events 2nd
StreamReassembler servlet
string pattern matching
        signatures 2nd 3rd 4th
String signature engine
        parameters
structured threats
        network security
Sub ID option (Signature Information page)
Subject option (Choose the Actions page) 2nd
submitting sensor configurations 2nd 3rd
Subnet mask option (Your Preferences page)
Subnet Mask value (Actions Display Preferences)
SubSig master signature parameter
subsignatures
summarization
       alarms
                key master signature parameter 2nd 3rd
Summarize summarization level (AlarmThrottle parameter)
SummaryKey master signature parameter
SummaryKey parameter (key master signatures) 2nd 3rd
Suspending and resuming new events option (Event Viewer)
Sweep signature engine 2nd
        Sweep.Host.ICMP 2nd
        Sweep.Host.TCP 2nd
        Sweep.Multi 2nd
        Sweep.OTHER.TCP 2nd
        Sweep.Port.TCP 2nd
        Sweep.Port.UDP
Sweep.Host.ICMP signature engine 2nd
Sweep.Host.TCP signature engine 2nd
Sweep.Multi signature engine 2nd
Sweep.OTHER.TCP signature engine 2nd
Sweep.Port.TCP signature engine 2nd
Sweep.Port.UDP signature engine
Switch IDS Module (IDSM2) 2nd
Switched Port Analyzer (SPAN) 2nd 3rd
       configuring
                switches
                switches, 2900XL/3500XL 2nd
                switches, 2950/3550 2nd
                switches, 4000/4500/6500 2nd 3rd
        creating
       RSPAN (Remote SPAN)
                switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
switches
        6500 2nd
                Catalyst advanced configurations 2nd
                Catalyst advanced configurations, multiple sensor/multiple VLAN
                Catalyst advanced configurations, single sensor/multiple VLAN
                Catalyst advanced configurations, single sensor/single VLAN
                Catalyst advanced configurations, trunk port configurations 2nd 3rd 4th
                Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th
                Catalyst IOS (Internetwork operating system) configurations
                Catalyst operating system (OS) 2nd 3rd 4th 5th 6th
                Catalyst operating system (OS) configurations 2nd 3rd 4th 5th
       RSPAN (Remote SPAN) configurations
                4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
        SPAN configurations
                2900XL/3500XL 2nd
                2950/3550 2nd
                4000/4500/6500 2nd 3rd
swtichport capture command 2nd
Sybase directory
Sybase SQL databases
       passwords
                IDS MC installations
syslog settings
       configuring
                Security Monitor
System Configuration option (Admin tab sheet) 2nd
Systems Administrator authorization role (CiscoWorks)
Systems Administrator user authentication role (CiscoWorks)
systemVariables
       variable values
                entering 2nd

[ LiB ]


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net