
642-531
B. Network uptime
C. Unauthorized network access
D. Network downtime
E. Network throughput
F. Network abuse
Answer: A, C, F
Explanation:
An IDS is software and possibly hardware that detects attacks against your network. They detect intrusive
activity that enters into your network. You can locate intrusive activity by examining network traffic, host logs,
system calls, and other areas that signal an attack against your network.
Reference:Cisco Secure Intrusion Detection System (Ciscopress) page 54
QUESTION 23
Which network device can be used to capture network traffic for intrusion detection systems without requiring
additional configuration?
A. Hubs
B. Switches
C. Network taps
D. Router
Answer: A
Explanation: The ability to capture traffic may be inherent to a device technology or may require special
features to provide this capability. For example, network hubs by their nature replicate data to all ports.
Switches, on the other hand, rely on features such as port mirroring to permit the copy of specific traffic top
another port.
Cisco Secure Intrusion Detection System 4 chap 5 page 3
QUESTION 24
How many sensing interfaces are supported on the NM-CIDS?
A. 1
B. 2
C. 4
D. 6
E. all router interfaces
Answer: A
QUESTION 25
The network administrator has informed the security administrator that the average number of packets
per seconds is 400.
Which Sensor selection factor should the security administrator take into consideration?
Komentarze do niniejszej Instrukcji