CSIDS Exam Cram 2 (Exam 642-531)

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

n to 1 attacks ( many-to-one )

n to n attacks (many-to-many)

NAC

        block actions 2nd

NAC (Network Access Controller) 2nd

names

       sensors

                changing

naming

        update files 2nd

        views

NAT address option (Enter Sensor Information page)

navigation

        IEV (IDS Event Viewer)

                alarm information, viewing

                Expand Whole Details option

                views, closing

                views, columns 2nd

                views, creating 2nd

                views, data sources

                views, deleting

                views, displaying

                views, naming

                views, Realtime Dashboard 2nd

                views, Realtime Graph data 2nd

                views, signature grouping

                views, Statistic Graph data 2nd

NetRangers. [See standalone sensor appliances]

Network Access Controller (NAC) 2nd

Network Administrator authorization role (CiscoWorks)

Network Administrator user authentication role (CiscoWorks)

network intrusions

        false negatives

        false positives

        signatures 2nd 3rd

                heuristic-based 2nd

                profile-based (anomaly) intrustion detection

                protocol decode-based analysis 2nd

                signature-based (misuse) intrusion detection

                signature-based (misuse) intrusion detection, pattern matching 2nd

network intrustions

        false negatives

        false positives

Network Operator authorization role (CiscoWorks)

Network Operator user authentication role (CiscoWorks)

network protocols

        selecting signature engines

network security 2nd 3rd 4th

        active defense system 2nd

        attack management protocols 2nd 3rd

        attack responses 2nd

        attack taxonomy 2nd

                application attacks 2nd

                IP spoofing 2nd

                man-in-the-middle attacks

                packet sniffers 2nd

                password attacks 2nd

                viruses 2nd

        attacks

                access

                DoS (denial-of-service) 2nd 3rd

                ICMP-based

                reconnaissance

        Cisco Security Wheel 2nd

                steps

                steps, environment monitoring

                steps, environment security

                steps, environment testing

                steps, security policy improvement

        Cisco Threat Response

        external threats

        HIPS (host-focused intrusion protection system) 2nd 3rd

                CSA MC (Cisco Securty Agent Management Center)

                Security Agent

        internal threats

        management

                CSA MC (Cisco Security Agent Management)

                IDM

                IEV 2nd

                VPN (Virtual Private Network)/VMS (Security Management Solution) 2nd

        NIDS (network-focused intrusion detection) 2nd 3rd 4th

                4200 Series Sensor Appliances

                Firewall Sensor PIX (Private Internet Exchange) IDS

                Router Sensor IOS (Internetwork Operating System) IDS

                Switch Sensor IDS Module (IDSM2) 2nd

        structured threats

        triggers 2nd

                heuristic-based signatures 2nd

                profile-based (anomaly) intrusion detection

                protocol decode-based analysis 2nd

                signature-based (misuse) intrusion detection

                signature-based (misuse) intrusion detection, pattern matching

                signature-based (misuse) intrusion detection, stateful pattern matching

        unstructured threats

Network Security Database (NSDB) 2nd

        Related Vulnerability page 2nd 3rd

        Signature Information page 2nd

        User Notes page

network security policy

        functions 2nd

        RFC 2196 [quote]Site Security Handbook[quote]

Network Settings dialog box

network signatures

       updating

                Security Monitor

network topologies

        blocking

network-focused intrusion detection (NIDS) 2nd 3rd 4th

        4200 Series Sensor Appliances

        Firewall Sensor PIX (Private Internet Exchange) IDS

        Router Sensor IOS (Internetwork Operating System) IDS

        Switch IDS Module (IDSM2) 2nd

NetworkAccess service level 2nd 3rd

networkParams option (services host configuration level)

networks

       entry points

                blocking

       internal

                global sensing configurations

       multiple

                sensor applicance placement

       signatures

                updating 2nd

never-block addresses (blocking configurations) 2nd

New, Devices command (File menu)

New, Filter command (File menu)

New, View command (File menu)

NIDS (network-focused intrusion detection) 2nd 3rd 4th

        4200 Series Sensor Appliances

        Firewall Sensor PIX (Private Internet Exchange) IDS

        Router Sensor IOS (Internetwork Operating System) IDS

        Switch Sensor IDS Module (IDSM2) 2nd

NM-CIDS sensor module 2nd

no shutdown command

Notifiy via email option (Choose the Actions page)

NSDB (Network Security Database) 2nd

        Related Vulnerability page 2nd 3rd

        Signature Information page 2nd

        User Notes page

Number of IP log files option (Automatic IP Logging page)

[ LiB ]

Категории