Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Fiche technique Page 135

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 168
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 134
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 135 -
Topic 12, Monitor a large scale deployment
of Cisco IDS Sensors with Cisco IDS
Monitoring software (15 questions)
Section 1: Define features and key concepts of the Security Monitor (2
questions)
QUESTION NO: 1
Which of the following represents a protocol used by the Monitoring Center for Security
to monitor alarms on a PIX Firewall?
A. SSL
B. SSH
C. Syslog
D. PostOffice
E. Not supported (Security Monitor does not support this platform)
Answer: C
Explanation:
Adding a PIX Firewall or Cisco IDS Host Sensor
PIX Firewalls and Cisco IDS Host Sensors use syslog messages to communicate with
Security Monitor.
You do not have to add syslog devices because Security Monitor monitors all syslog traffic on
the UDP port. However, if you want the syslog device name to appear in reports (instead of
the device IP address), add the device configuration to Security Monitor.
Reference:
Cisco Courseware 16-34
QUESTION NO: 2
The new TestKing trainee technician wants to know which protocol the Monitoring
Center for Security use to monitor alarms on an IDS v3.x Sensor. What would your
reply be?
A. SSL
B. SSH
C. HTTP
D. PostOffice
Answer: D
Explanation:
A sensor can monitor the services that are running on it. The sensor can generate audit events,
as warnings, when a service goes down or cannot be restarted. This monitoring function,
Vue de la page 134
1 2 ... 130 131 132 133 134 135 136 137 138 139 140 ... 167 168

Commentaires sur ces manuels

Pas de commentaire