
642-531
E. by Sensor
F. by address
Answer: C, D
Page 16-58 CSIDS Courseware under Event-Viewer - Creating Graph
Two types of graphs:
- By Child (Displays child events across the X-axis of the graph and the number of occurrences along the
Y-axis)
number of occurrences)
QUESTION 234
Which Cisco IDS Sensor configuration parameter affects the source and destination values included in an IDS
alarm event?
A. Data source
B. IP fragment reassembly
C. External network definition
D. Internal network definition
E. TCP reassembly
F. Sensor IP address
Answer: D
Explanation:
You can use the source and destination location to alter your response to specific alarms. Traffic coming from a
system within your network to another internal host that generates an alarm may be acceptable, whereas, you
might consider this same traffic, originating from an external host or the Internet, totally unacceptable.
Reference:Cisco Secure Intrusion Detection System (Ciscopress) page 183
QUESTION 235
Which of the following protocols is used by the Monitoring Center for Security to monitor alarms on the IDS
Sensor?
A. SSH
B. RDEP
C. IDAPI
D. PostOffice
E. SSL
Answer: B
Explanation:
A) SSH Wrong
B) RDEP only for the IDS appliance Version 4.x
C) IDAPI Wrong
D) Post Office only for the IDS appliance Version 3.x
Comentários a estes Manuais