Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Arkusz Danych Strona 3

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 168
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 2
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 3 -
Table of contents
Topic 1, Describe and explain the various intrusion detection technologies and evasive
techniques (17 questions) ........................................................................................................... 6
Section 1: Define intrusion detection (7 questions) ............................................................... 6
Section 2: Explain the difference between true and false, and positive and negative alarms
(4 questions) ........................................................................................................................... 9
Section 3: Describe the relationship between vulnerabilities and exploits (2 questions) .... 12
Section 4: Explain the difference between HIP and NIDS (0 questions)............................. 13
Section 5: Describe the various techniques used to evade intrusion detection (4 questions)
.............................................................................................................................................. 13
Topic 2, Design a Cisco IDS protection solution for small, medium, and enterprise customers
(36 questions) ........................................................................................................................... 16
Section 1: List the network devices involved in capturing traffic for intrusion detection
analysis (8 questions) ........................................................................................................... 16
Section 2: Describe the traffic flows for each of the network devices (2 questions) ........... 19
Section 3: Explain the features and benefits of IDM (6 questions)...................................... 20
Section 4: Identify the requirements for IDM (2 questions) ................................................ 22
Section 5: Configure Cisco Catalyst switches to capture network traffic for intrusion
detection analysis (18 questions).......................................................................................... 23
Topic 3, Identify the Cisco IDS Sensor platforms and describe their features (3 questions) .. 36
Section 1: Describe the features of the various IDS Sensor appliance models (3 questions)
.............................................................................................................................................. 36
Topic 4, Install and configure a Cisco IDS Sensor including a network appliance and IDS
module Identify the interfaces and ports on the various Sensors (47 questions) ..................... 38
Section 1: Distinguish between the functions of the various Catalyst IDS Module ports (1
question) ............................................................................................................................... 38
Section 2: Initialize a Catalyst IDS Module (4 questions) ................................................... 38
Section 3: Verify the Catalyst 6500 switch and Catalyst IDSM configurations (7 questions)
.............................................................................................................................................. 40
Section 4: Install the Sensor software image (3 questions).................................................. 46
Section 5: Install the Sensor appliance on the network (2 questions) .................................. 48
Section 6: Obtain management access on the Sensor (6 questions)..................................... 49
Section 7: Initialize the Sensor (2 questions) ....................................................................... 52
Section 8: Describe the various command line modes (3 questions) ................................... 52
Section 9: Navigate the CLI (2 questions) ........................................................................... 53
Section 10: Apply configuration changes made via the CLI (0 questions).......................... 55
Section 11: Create user accounts via the CLI (4 questions)................................................. 55
Creating the Service Account............................................................................................... 56
Section 12: Configure Sensor communication properties (3 questions) .............................. 57
Section 13: Configure Sensor logging properties (1 question) ............................................ 59
Section 14: Perform a configuration backup via the CLI (0 questions) ............................... 60
Section 15: Setting up Sensors and Sensor Groups (7 questions)........................................ 60
Section 16: Sensor Communications Sensor Logging (2 questions) ................................... 64
Topic 5: Tune and customize Cisco IDS signatures to work optimally in specific
environments (12 questions) .................................................................................................... 66
Section 1: Configure the Sensor's sensing parameters (3 questions) ................................... 66
Przeglądanie stron 2
1 2 3 4 5 6 7 8 ... 167 168

Komentarze do niniejszej Instrukcji

Brak uwag