CSIDS Exam Cram 2 (Exam 642-531)

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

tab sheets

        IDM (IDS Device Manager)

        IDS MC interface

        Refresh Cycle preferences 2nd

        Security Monitor 2nd

Table of Contents (TOC)

        IDS MC interface

tables

       host

                adding entries

target addresses

        selecting signature engines

target ports

        selecting signature engines

TCP (Transmission Control Protocol)

        resetting (attack response)

TCP Embryonic Timeout setting (IP packet reassembly)

TCP Open Establish setting (IP packet reassembly)

TCP packet attacks

TCP Reassembly Mode setting (IP packet reassembly)

TCP Reset respose action (triggered signatures)

TCP resets

TCP Three Way Handshake setting (IP packet reassembly)

Telnet

        blocking devices

        CLI (command-line interface) access 2nd

        services host networkParams level

Telnet connection

testing

       environment security

                Cisco Security Wheel

tests. 2nd [See exams]

TFN2K Trojan signature engine

threshold

       configuring

                signatures

ThrottleInterval master signature parameter

ThrottleInterval parameter

Time between attempts option (Enter Job Properties page)

Time to block option (Your Preferences page)

Time to Block value (Actions Display Preferences)

Time/date option (Report Filtering page)

timeParams option (services host configuration level)

TLS (Transaction Layer Security)

TLS (Transport Layer Security)

        self-signed X.509 certificates

tls generate-key command

TOC (Table of Contents)

        IDS MC interface

TOC options

        Event Viewer 2nd

Tomcat directory

Tools menu commands

        Realtime Dashboard, Launch Dashboard

        Realtime Graph

Top n option (Report Filtering page)

topologies

       networks

                blocking

Total events option (Specify the Trigger Condition page)

Total IDS events option (Specify the Trigger Condition page)

Totla syslog events option (Specify the Trigger Condition page)

traffic

        blocking (attack response)

traffic capture

        Catalyst 6500 advanced configurations 2nd

                mulitiple sensor/multiple VLAN

                single sensor/multiple VLAN

                single sensor/single VLAN

                trunk port configurations 2nd 3rd 4th

        mls ip ids command

                Catalyst IOS (Internetwork operating system) configurations

                Catalyst operating system (OS) configurations 2nd 3rd 4th 5th

        overview 2nd 3rd

       RSPAN (Remote SPAN)

                switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th

        sensor monitoring ports

        SPAN (Switched Port Analyzer) 2nd 3rd

                creating

                switch configurations

                switch configurations, 2900XL/3500XL 2nd

                switch configurations, 3950/3550 2nd

                switch configurations, 4000/4500/6500 2nd 3rd

        VACLs (VLAN access control lists) configurations

                Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th

                Catalyst operating system (OS) 2nd 3rd 4th 5th 6th

Traffic.ICMP signature engines 2nd

Transaction Layer Security (TLS)

Transaction Server

Transmission Control Protocol (TCP)

        resetting (attack response)

Transport Layer Security (TLS)

        self-signed X.509 certificates

trigger conditions

        database rules 2nd

triggered signatures

        reponse actions 2nd

triggers 2nd

        heuristic-based signatures 2nd

        profile-based (anomaly) intrusion detection

        protocol decode-based analysis 2nd

        signature response actions

        signature-based (misuse) intrusion detection

                pattern matching

                pattern matching, stateful

Trojan horse 2nd

Trojan signature engines 2nd

trunk ports

        configuring

                adding VLANs 2nd

                assigning destination ports 2nd

                assigning monitoring ports

                clearing VLANs 2nd

                destination capture ports

tuned signatures

tuning signatures 2nd

        custom signatures 2nd

        FTP logins 2nd

        IP protocols 2nd

[ LiB ]

Категории