Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Arkusz Danych Strona 135

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 168
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 134
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 135 -
Topic 12, Monitor a large scale deployment
of Cisco IDS Sensors with Cisco IDS
Monitoring software (15 questions)
Section 1: Define features and key concepts of the Security Monitor (2
questions)
QUESTION NO: 1
Which of the following represents a protocol used by the Monitoring Center for Security
to monitor alarms on a PIX Firewall?
A. SSL
B. SSH
C. Syslog
D. PostOffice
E. Not supported (Security Monitor does not support this platform)
Answer: C
Explanation:
Adding a PIX Firewall or Cisco IDS Host Sensor
PIX Firewalls and Cisco IDS Host Sensors use syslog messages to communicate with
Security Monitor.
You do not have to add syslog devices because Security Monitor monitors all syslog traffic on
the UDP port. However, if you want the syslog device name to appear in reports (instead of
the device IP address), add the device configuration to Security Monitor.
Reference:
Cisco Courseware 16-34
QUESTION NO: 2
The new TestKing trainee technician wants to know which protocol the Monitoring
Center for Security use to monitor alarms on an IDS v3.x Sensor. What would your
reply be?
A. SSL
B. SSH
C. HTTP
D. PostOffice
Answer: D
Explanation:
A sensor can monitor the services that are running on it. The sensor can generate audit events,
as warnings, when a service goes down or cannot be restarted. This monitoring function,
Przeglądanie stron 134
1 2 ... 130 131 132 133 134 135 136 137 138 139 140 ... 167 168

Komentarze do niniejszej Instrukcji

Brak uwag