
642-531
With postoffice-based CiscoIntrusionDetectionSystem Sensors (sensors running sensor software version 3.x)
you can discover postoffice settings directly from the device. This is accomplished using a Secure Shell (SSH)
session.
SSH is a protocol for secure remote login and other secure network services over an insecure network.
Reference:Cisco Courseware 6-8
QUESTION 75
Which of the following management access methods are enabled by default on the Sensor in a Cisco IDS
appliance? (Choose all that apply.)
A. Telnet
B. SSH
C. https
D. IPSec
E. Postoffice
Answer: B, C
Following are the methods used to gain management access to a Sensor:
- Console port
- Monitor and Keyboard
- Telnet (Disabled by default)
- SSH (Enabled by default)
- HTTPS (Enabled by default)
Cisco Courseware 7-22, 7-23
QUESTION 76
Which user account role must you specifically create inorder to allow special root access for
troubleshooting purposes only on a Cisco IDS Sensor?
A. operator
B. viewer
C. service
D. administrator
E. client
Answer: C
Explanation:
The service account is a special account that allows TAC to log into a native, operating system shell rather than
a CLI shell. The purpose of the service account is not to support configuration but to support troubleshooting.
to use during troubleshooting. Root access to the Sensor is only possible if you log into the service account and
su to the root account.
Reference: Cisco Student Guide v4.0 p.6-13
QUESTION 77
Which management access methods require that an IP address be assigned to a Cisco IDS Sensor? (Choose
Comentários a estes Manuais