| 1. | What are the five CiscoWorks user roles that are relevant to IDS MC and Security Monitor operations? |
| 2. | What is the minimum amount of RAM and virtual memory recommended for a Windows server running Security Monitor? |
| 3. | What is the minimum amount of RAM and virtual memory recommended for a Windows client system used to connect to Security Monitor? |
| 4. | Which two browsers are supported for use by the Windows-based Security Monitor client systems? |
| 5. | What types of devices can you monitor with Security Monitor? |
| 6. | What are the two major protocols used to communicate between Security Monitor and IDS/IPS devices? |
| 7. | Which parameters can you use to configure event rules? |
| 8. | What actions can an event rule initiate? |
| 9. | What are the four tasks that you need to perform when adding an event rule? |
| 10. | What device statistical categories can you view using Security Monitor? |
| 11. | What are your two options when deleting rows from the Event Viewer, and how are they different? |
| 12. | What is the default expansion boundary? |
| 13. | Which report template would you use to find out which systems have launched the most attacks against your network in a specified time period? |
| 14. | What icons are used to indicate alarm severity? |
| 15. | What does the Blank Left check box do when configured as your cell preference? |