Cisco IDS 4210 - Intrusion Detection Sys 4210 Sensor Arkusz Danych Strona 35

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 70
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 34
9E0 - 100
Leading the way in IT testing and certification tools, www.testking.com
- 35 -
Internet Protocol (IP)
NetBIOS over IP (Microsoft Networking)
Point-to-Point Tunneling Protocol (PPTP)
Simple Network Management Protocol (SNMP)
Sitara Networks Protocol (SNP)
SQL*Net (Oracle client/server protocol)
Sun Remote Procedure Call (RPC) services, including Network File System (NFS)
Telnet
Transmission Control Protocol (TCP)
Trivial File Transfer Protocol (TFTP)
User Datagram Protocol (UDP)
RFC 1700
Reference:
Cisco PIX Firewall Software - TCP/IP Reference Information
QUESTION NO: 67
Which type of ACL is allowed when implementing the Cisco IDS IP blocking feature
using post-shun ACLs?
A. Numbered IP extended
B. Named IPX extended
C. Numbered IP standard
D. Numbered IPX standard
Answer: A
Explanation: Extended ACLs enable you to create fine-tuned filtering policies.
Reference: Cisco Secure Intrusion Detection System (Ciscopress) page 464
QUESTION NO: 68
What reconnaissance methods are used to discover servers running SMTP and SNMP?
(Choose two)
A. TCP scans for port 25
B. UDP scans for port 25
C. UDP scans for port 161
D. ICMP sweeps for port 25
E. ICMP sweeps for port 161
Przeglądanie stron 34
1 2 ... 30 31 32 33 34 35 36 37 38 39 40 ... 69 70

Komentarze do niniejszej Instrukcji

Brak uwag