
642-531
Answer: A, D, E
Explanation:
The Security Monitor enables you to launch a notification, trigger a script, or sent an e-mail when a database
rule is triggered. These database rules can be triggered when the Security Monitor database reaches a certain
size, a number of events happen, or on a daily basis.
The Security Monitor comes with three predefined rules for database maintenance:
1) Default pruning - Default pruning for alarm tables when the database reaches 2,000,000 total events.
2) Default Syslog pruning - Default pruning for Syslog tables when a database reaches 2,000,000 total events.
3) Default audit log pruning - Default pruning for audit log pruning performed on a daily basis.
Reference: CSIDS Student Guide v4.0 p.16-63
Cisco Courseware 16-63
QUESTION 241
You have recently been employed by Certkiller and have inspected the configuration of Certkiller 's
IDS-4215 Sensor. You then decide to modify access on user accounts and return some of the system's
parameters to a known baseline through the following actions:
1)Create a backup of the running configuration to a remote FTP server.
2)Verify existing accounts and access privileges.
3)Delete the service account.
4)Reduce the access rights of your assistant, Jack King, from administrative access to one that can only
monitor IDS events and tune IDS signatures.
5)Return all SERVICE HTTP signatures to their default settings.
Use the information in the following table to accomplish these tasks successfully.
CISCO IDS Parameters Settings
Sensor administrator username/password Certkiller / Certkiller 1636
FTP server address 172.16.16.100
FTP username/password admin/password2
FTP upload directory / Certkiller 5287
Backup file name /backup-cfg
Assistant's account user ID tessking
Click on the picture of the host connected to an IDS Sensor by a serial console cable.
Komentarze do niniejszej Instrukcji