Datasheet

9E0 - 100
Leading the way in IT testing and certification tools, www.testking.com
- 31 -
Answer: B
Explanation:
Write terminal displays current configuration on the terminal.
Reference:
Cisco PIX Firewall Command Reference, Version 6.3
QUESTION NO: 58
Which Cisco IDS signatures are affected by the Sensor’s level of traffic logging value?
A. String signatures
B. HTTP signatures
C. TCP connection signatures
D. FTP connection signatures
E. ICMP signatures
Answer: C
Explanation:
Connection signatures are user-configurable attack signatures based on the transport-layer
protocol (TCP or UDP) and port number of the packets being monitored
Reference:
Sensor Signatures
QUESTION NO: 59
An anonymous person has posted a tool on a public website that can cause Cisco DSL
routers to reboot.
What term describes how this tool is used to leverage the weakness in the Cisco DSL
routers?
A. Vulnerability
B. Exploit
C. Rootkit
D. Exposure
Answer: B
Explanation:
Exploits activity—Indicative of someone attempting to gain access or compromise systems on
your network, such as Back Orifice, failed login attempts, and TCP hijacking
Reference: Cisco Intrusion Detection System - Cisco Secure Intrusion Detection System
QUESTION NO: 60
A university’s security policy states that network devices must be managed using secure
communication methods.
Which Cisco IDS Sensor services must be disabled to meet this requirement? (Choose
two)
A. SSH