CSIDS Exam Cram 2 (Exam 642-531)

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

Edit menu commands

        Application Settings

Edit Signatures page

        options 2nd

egress SPAN

Email option (Add User page)

Email report to option (Enter Job Properties page)

Email report to option (Schedule Report page)

embryonic connections

Enabled master signature parameter

encrypting

        RDEP (Remote Data Exchange Protocol)

encryption

encryption licenses

        managed devices

engines

        signatures 2nd 3rd 4th

                atomic category 2nd

                atomic category, Atomic.ARP 2nd

                atomic category, Atomic.ICMP 2nd

                atomic category, Atomic.IPOptions 2nd

                atomic category, Atomic.L3.IP 2nd

                atomic category, Atomic.TCP 2nd 3rd

                atomic category, Atomic.UDP 2nd

                categories 2nd

                flood category 2nd

                flood category, Flood.Host.ICMP

                flood category, Flood.Host.UDP 2nd

                flood category, Flood.Net.Engine 2nd

                OTHER 2nd

                parameters

                parameters, local 2nd 3rd 4th 5th

                parameters, master 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

                parameters, protected 2nd

                parameters, required 2nd

                selecting 2nd

                Service category 2nd

                Service category, Service.DNS

                Service category, Service.FTP

                Service category, Service.Generic

                Service category, Service.HTTP

                Service category, Service.IDENT

                Service category, Service.MSSQL

                Service category, Service.NTP

                Service category, Service.RPC

                Service category, Service.SMB 2nd

                Service category, Service.SNMP

                Service category, Service.SSH

                State category

                State category, State.String

                State category, State.String.Ciscologin

                State category, State.String.Lprformat

                State category, State.String.SMTP

                String category

                String category, parameters

                Sweep category 2nd

                Sweep category, Sweep.Host.ICMP 2nd

                Sweep category, Sweep.Host.TCP 2nd

                Sweep category, Sweep.Multi 2nd

                Sweep category, Sweep.OTHER.TCP 2nd

                Sweep category, Sweep.Port.TCP 2nd

                Sweep category, Sweep.Port.UDP

                Traffic.ICMP 2nd

                Trojan category 2nd

Enter Blocking Devices page

Enter Device Information page 2nd 3rd 4th 5th

Enter Group Information page 2nd

Enter Job Properties page 2nd

Enter Sensor Information page 2nd 3rd

entry points

       networks

                blocking

erase command 2nd

Etc directory

evAlert (event logging)

evasive detection techniques

        encryption

        flooding

        fragmentation

        obfuscation 2nd

Event level option (Report Filtering page)

event logging

        IDS MC 2nd 3rd

event logs

       contents

                displaying

event messages

event rules

        actions 2nd

        creating 2nd 3rd 4th 5th 6th 7th

        operators

Event security indicator option (Your Preferences page)

Event Server

Event start time option (Device Properties dialog box)

Event Viewer 2nd

        columns

                manipulating 2nd

        Display Preferences

                Actions 2nd

                Boundaries

                Cells

                Database

                Sort By

        drillsheets

       events

                resuming/suspending

       graphs

                creating 2nd

        launching

        options 2nd

Event Viewer Preferences 2nd 3rd

EventAction master signature parameter

eventFilters

       logging alarms

                blocking 2nd

events

       alert

                EventStore

        clearing

        continuous streaming 2nd

       monitoring

                Security Monitor 2nd 3rd 4th 5th 6th

        pulling

       resuming/suspending

                Event Viewer

EventStore

        alert events

evError (event logging)

evLogTransaction (event logging)

evShunRequest (event logging)

evStatus (event logging)

exams

       Cisco IDS (Intrusion Detection System) software

                formats

                layout/design 2nd 3rd

                practice exams 2nd

                questin handling strategies 2nd 3rd 4th

                resources

                testing facilities 2nd

                time management 2nd

       practice

                1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

                2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

       practice 2

                answer key 2nd 3rd 4th 5th 6th 7th 8th 9th

exams. [See also practice exams]

exceptions

       filter

                signatures 2nd

Exclude events of the following severity levels option (Device Properties dialog box)

exclusive filters

        IEV (IDS Event Viewer)

Execute a script option (Choose the Actions page)

Expand Whole Details option (IEV views)

Expanded Details dialog box

expanding columns

        Event Viewer

Expanding columns option (Event Viewer)

Exploit links option (Related Vulnerability page)

Exploit type option (Related Vulnerability page)

Export Database Tables window

Extensible Markup Language (XML)

external ACLs (access control lists)

       blocking

                placement

external connections

        IDS (Intrustion Detection System)

                cidWebServer 2nd

                NAC (Network Access Controller) 2nd

                sensorApp 2nd

                sensorApp, VirtualAlarm process

                sensorApp, VirtualSensor process 2nd

                SSH (Secure Shell)

                Telnet

external threats

        network security

extracting data communications

        IDS (Intrusion Detection System) 2nd

                event messages

                IP log messages

                PostOffice protocol 2nd

                RDEP (Remote Data Exchange Protocol) 2nd

[ LiB ]

Категории