
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 23 -
What are the two methods used to initially access the IDSM? (Choose two.)
A. Telnet to the switch
B. Telnet to the IDSM
C. By use of the IDS Device Manager GUI
D. Console cable connection to the switch
E. By use of the RDEP protocol
ANSWER: A, D
Since module configuration is a sub instance of normal switch configuration, every method to
connect to the switch’s CLI makes IDSM Module configuration possible too.
See also:
Cisco Courseware 8-13
Section 5: Configure Cisco Catalyst switches to capture network
traffic for intrusion detection analysis (18 questions)
QUESTION NO: 1
Exhibit:
According to the exhibit, Server TestKing 4 is in VLAN 8. The Catalyst 6500 is running
Catalyst OS. Which of the following commands would you use as a configuration step if
one is to permit the ISDM2 to monitor traffic sent to and from VLAN3, VLAN4, and
VLAN5?
A. 6500(config)# monitor session 1 source 3-5 both
B. 6500(config)# monitor session 1 destination idsm
C. 6500(config)# monitor session 1 source vlan 3, 4, 5
D. 6500>(enable) set span 3 –5 8/1 both
E. 6500>(enable) set span source vlan-list 3 – 5 destination interface 8/1 both create
Answer: D
Explanation: Because of ISDM-2
Komentarze do niniejszej Instrukcji