CSIDS Exam Cram 2 (Exam 642-531)

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

Accelerator (XL) card 2nd 3rd

access

        CLI (command-line interface) 2nd

                console ports

                keyboars/ monitors

                SSH (Secure Shell) 2nd

                Telnet 2nd

        clients

                IDS MC installations 2nd

                Security Monitor 2nd

        restricting (attack response)

access attacks (network security)

access control lists

       VACLs (VLAN access control lists)

                ACEs (ACL entries) 2nd

                configuring

                configuring, Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th

                configuring, Catalyst operating system (OS) 2nd 3rd 4th 5th 6th

access control lists (ACLs)

       applying

                VLAN interfaces

        blocking

                compatibility

                existing

                manual configurations

                placement 2nd

       capture ports

                assigning

        creating 2nd 3rd

       interfaces

                blocking

       match clauses

                configuring 2nd

access maps

       VLAN

                action clauses

                action clauses;configuring 2nd

                applying to VLANs 2nd

                creating 2nd

                match clauses

                match clauses;configuring 2nd

accessing

        signatures via signature groups 2nd

                attack signatures 2nd

                L2/L3/L4 protocol signatures 2nd 3rd 4th

                OS signatures 2nd

                service signatures 2nd 3rd

accessList command

accounts

        user

                sensor appliances 2nd

       users

                privilege levels

                privilege levels, administrator

                privilege levels, changing

                privilege levels, operator

                privilege levels, service

                privilege levels, viewer

accounts. [See also user accounts]

ACEs (ACL entries)

        removing

ACL entries (ACEs)

        removing

ACLs (access control lists

       applying

                VLAN interfaces

ACLs (access control lists)

        blocking

                compatibility

                existing

                manual configurations

                placement 2nd

       capture ports

                assigning

        creating 2nd 3rd

       interfaces

                blocking

       match clauses

                configuring 2nd

action bars

        IDS MC interface

action clauses

        VLAN access maps

                configuring 2nd

action command 2nd

actions

        database rules 2nd

        event rules 2nd

       response

                triggered signatures 2nd

                triggers (signatures)

Actions (Display Preferences) 2nd

active defense systems 2nd

Add User page

        creating 2nd

addresses

        never-block (blocking configurations) 2nd

       target

                selecting signature engines

Admin tab sheet

        Database Rules option 2nd 3rd 4th 5th

        System Configuration option 2nd

administration

        Security Monitor

                Database Rules option 2nd 3rd 4th 5th

                Event Viewer Preferences 2nd 3rd

                System Configuration option 2nd

Administration tab sheet (IDM)

administrator privilege level

Administrator role (sensor user accounts)

Advisory related information option ( Related Vulnerability page)

Affected programs option (Related Vulnerability page)

Affected systems option (Related Vulnerability page)

alarm channels

        virtualAlarm 2nd

alarm counters

        parameters 2nd 3rd

alarm summarization

alarm throttling

        key master signature parameter 2nd

AlarmChannel process

AlarmDelayTimer master signature parameter

AlarmInterval master signature parameter

alarms

       logging

                blocking 2nd

       monitoring

                IEV (IDS Event Viewer)

        security levels

                high

                informational

                low

                medium

        viewing information (IEV)

AlarmSeverity master signature parameter

AlarmThrottle master signature parameter

AlarmThrottle parameter 2nd

AlarmTraits master signature parameter

alert events

        EventStore

Alias option (Related Vulnerability page)

allowed hosts

        IDS MC

anitvirus software

anomaly (profile-based) intrusion detection

answer keys

        practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th

        practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th

anti-evasive techniques

        signatures

antispoofing

Apache directory

application attacks (attack taxonomy) 2nd

application settings

       IEV (IDS Event Viewer)

                configuring 2nd

                Data Archival Setup 2nd

                Refresh Cycle 2nd

Application Settings command (Edit menu)

applications

        IDS (Intrustion Detection System) 2nd 3rd

        sensorApp 2nd

                processes, VirtualAlarm

                processes, VirtualSensor 2nd

Approver authorization role (CiscoWorks)

Approver user authentication role (CiscoWorks)

Argument option (Choose the Actions page)

AT address option (Enter Sensor Information page)

atomic signature engine category 2nd

        Atomic.ARP 2nd

        Atomic.ICMP 2nd

        Atomic.IPOptions 2nd

        Atomic.L3.IP 2nd

        Atomic.TCP 2nd 3rd

        Atomic.UDP 2nd

Atomic.ARP atomic signature engine 2nd

Atomic.ICMP atomic signature engine 2nd

Atomic.IPOptions atomic signature engine 2nd

Atomic.L3.IP atomic signature engine 2nd

Atomic.TCP atomic signature engine 2nd 3rd

Atomic.UDP atomic signature engine 2nd

attack responses 2nd

attack signatures

        accessing 2nd

attack taxonomy (network security) 2nd

        application attacks 2nd

        IP spoofing 2nd

        man-in-the-middle attacks

        management protocols 2nd 3rd

        packet sniffers 2nd

        password attacks 2nd

        viruses 2nd

attackers

        evasive detection techniques

                encryption

                flooding

                fragmentation

                obfuscation 2nd

attacks

        Layer 2 ARP

        Layer 3 ICMP

        Layer 3 IP option

        Loki

        many-to-many (n to n)

        many-to-one (n to 1)

        reconnaissance

        selecting signature engines

        signatures

        Stacheldraht

        TCP packets

attacks (network security)

        access

        DoS (denial-of-service) 2nd 3rd

        ICMP-based

        reconnaissance

authentication

        blocking

        CSACS (Cisco Secure Access Server)

        OTP (one-time-passwords)

        PIX Firewall

        PIX Firewall (blocking)

        RSA (Rivest Shamir Adleman)

       user roles

                CiscoWorks 2nd

authorization

       roles

                CiscoWorks 2nd

Auto collapse enabled option (Your Preferences page)

Auto query enabled option (Your Preferences page)

automatic blocks

        time limits

Automatic IP Logging page 2nd

automatic logging

        IDS MC 2nd 3rd 4th

[ LiB ]

Категории