Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Arkusz Danych Strona 140

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 168
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 139
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 140 -
A. Data source
B. IP fragment reassembly
C. External network definition
D. Internal network definition
E. TCP reassembly
F. Sensor IP address
Answer: D
Explanation:
You can use the source and destination location to alter your response to specific alarms.
Traffic coming from a system within your network to another internal host that generates an
alarm may be acceptable, whereas, you might consider this same traffic, originating from an
external host or the Internet, totally unacceptable.
Reference: Cisco Secure Intrusion Detection System (Ciscopress) page 183
Section 5: Create alarm exceptions to reduce alarms and possible
false positives (5 questions)
QUESTION NO: 1
Which of the following protocols is used by the Monitoring Center for Security to
monitor alarms on the IDS Sensor?
A. SSH
B. RDEP
C. IDAPI
D. PostOffice
E. SSL
Answer: D
Explanation:
A sensor can monitor the services that are running on it. The sensor can generate audit events,
as warnings, when a service goes down or cannot be restarted. This monitoring function,
called Watchdog, helps you track the state and desired operation of your sensors. Watchdog is
a feature of the postoffice service.
Watchdog checks the availability of services that are supposed to be running on the sensor and
verifies that desired sensor-to-other network object communications (based on postoffice) are
available. The Watchdog queries the services to see if they are operational, and if they are not,
it issues warnings to the user and attempts to restart the services. You can specify the alarm
levels of these warnings.
Additional postoffice settings that you can specify are the postoffice port and the heartbeat
interval.
Przeglądanie stron 139
1 2 ... 135 136 137 138 139 140 141 142 143 144 145 ... 167 168

Komentarze do niniejszej Instrukcji

Brak uwag