CSIDS Exam Cram 2 (Exam 642-531)

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

Daily beginning option (Specify the Trigger Condition page)

data

       Realtime Graph

                viewing 2nd

       Statistic Graph

                viewing 2nd

Data Archival Setup tab 2nd

data extractions communications

        IDS (Intrusion Detection System) 2nd

                event messages

                IP log messages

                PostOffice protocol 2nd

                RDEP (Remote Data Exchange Protocol) 2nd

data sources

       views

                IEV (IDS Event Viewer)

Database (Display Preferences)

Database Administration, Export Data Source Information command (File menu)

Database Administration, Export Database Tables command (File menu)

Database free space less than (megabytes) option (Specify the Trigger Condition page)

Database Rules option (Admin tab sheet) 2nd 3rd 4th 5th

Database ussed space greater than (megabytes) option (Specify the Trigger Condition page)

DatabaseHandler servlet

databases

       administering

                IEV (IDS Event Viewer) 2nd

        NSDB (Network Security Database) 2nd

                Related Vulnerability page 2nd 3rd

                Signature Information page 2nd

                User Notes page

       Sybase SQL

                passwords (IDS MC installations)

DDoS (Distributed DoS

debugging

        sensors

Default expansion boundary option (Your Preferences page)

Default Expansion Boundary value (Boundaries Display Preferences)

default signatures

Deleting columns option (Event Viewer)

denial-of-service (DoS) attacks 2nd 3rd

deployment

        sensor configurations 2nd

                generating

                pending configurations

                submit configurations 2nd 3rd

Deployment tab sheet

        Deploy option

                pending configurations

                submit configurations 2nd 3rd

        Generate option

Description option (Enter Group Information page)

Destination address option (Report Filtering page)

destination capture ports

        configuring

Destination direction option (Report Filtering page)

destination ports

       assigning

                VLANs 2nd

        configuring 2nd 3rd 4th 5th 6th

        VACL (VLAN access control lists)

destination sessions

       configuring

                RSPAN (Remote SPAN) 2nd

detection evasive techniques

        encryption

        flooding

        fragmentation

        obfuscation 2nd

device logins

        blocking

Device monitoring (Security Monitor)

Device Properties dialog box 2nd

devices

       adding

                Security Monitor

        blocking 2nd

                requirements 2nd

                requirements, communication 2nd

                SSH (Secure Shell)

                Telnet

       importing

                Security Monitor 2nd

       IOS

                Security Monitor 2nd

       managed

                Cisco Catalyst 6000 VACL (blocking) 2nd 3rd

                Cisco IOS Routers (blocking) 2nd 3rd 4th 5th

                Cisco PIX Firewall (blocking) 2nd 3rd 4th

                configuring 2nd 3rd

                encryption licenses

       PostOffice

                Security Monitor 2nd

       RDEP

                Security Monitor 2nd

       sensor

                adding, IEV (IDS Event Viewer)

       sensors

                IDS MC

                IDS MC, adding 2nd 3rd 4th

                IDS MC, existing SSH keys 2nd

                IDS MC, SSH keys 2nd

Devices menu commands

        Sensor Group

        Sensor, Add

        Sensors, Add

Devices tab sheet (IDM)

dialog boxes

        Device Properties 2nd

        Expanded Details

        Network Settings

        PuTTY Key Generator

dialogs

       sensor settings

                configuring

directories

        IDS MC 2nd

Discover settings (Enter Sensor Information page)

Discover settings option (Enter Sensor Information page)

Display Preferences

        Actions 2nd

        Boundaries

        Cells 2nd

        Database

Distributed DoS (DDos)

DoS (denial-of-service) attacks 2nd 3rd

downgrade command

downloading

        IEV (IDS Event Viewer)

drillsheets (Event Viewer)

Duration of log option (Automatic IP Logging page)

[ LiB ]

Категории