Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Fiche technique Page 8

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 168
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 7
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 8 -
QUESTION NO: 4
Which of the following is typical of signature-based intrusion detection?
A. Signature creation is automatically defined
B. Signature match patterns of malicious activity
C. Signatures are prone to a high number of false positive alarms.
D. Signatures focus on TCP connection sequences
Answer: B
Page 65 Cisco Press CCSP CSIDS 2nd edition under Misuse Detection
QUESTION NO: 5
What does an attacker require to perform a Denial of Service attack?
A. a means of network access
B. prior access to the target
C. previously installed root kit
D. username and password
ANSWER: A
DOS attacks are performed by flooding the network, so the only requirement is access to the
network.
C, the requirement of installing tools to perform distributed attacks (whatever a root toolkit
may be) is only true for DDOS attacks.
As the aim is not to gain access no usernames or passwords (D), and even no prior access to
the target host (B) is required.
Page 2-28 CIDS Courseware v4.0
QUESTION NO: 6
Which value can be assigned to define the Cisco IDS 4210 Sensor’s sensing interface?
A. Auto
B. Detect
C. Probe
D. Sniffing
E. Select
Answer: D
Explanation:
Vue de la page 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 167 168

Commentaires sur ces manuels

Pas de commentaire