Datasheet

9E0 - 100
Leading the way in IT testing and certification tools, www.testking.com
- 48 -
B. Access the console port by using an RS-232 cable and a terminal emulation program.
Connect a monitor and mouse directly on the sensor.
C. Access the console port by using an RS-232 cable and a terminal emulation program.
Use Telnet after the sensor has been assigned an IP address.
D. Access the console port by using an RS-232 cable and a terminal emulation program.
Connect a monitor and a mouse directly on the sensor use Telnet after the sensor has
been assigned an IP address.
E. Access the console port by using an RS-232 cable and a terminal emulation program.
Connect a monitor and a keyboard directly on the sensor use Telnet after the sensor
has been assigned an IP address.
Answer: E
Explanation: You HAVE to have a keyboard, you don't have to have a mouse along with the
monitor. Ref Cisco Secure Intrusion Detection System p. 149
Following are the methods used to gain management access to a Sensor
Console port
Monitor and keyboard
Telnet
SSH
HTTPS
- Cisco Secure Intrusion Detection System 4 chap 7 page 23
QUESTION NO: 13
When applying ACL’s on the external interface, what is true?
A. The host is denied before it enters the router.
The shun does not apply to the router itself.
The user-defined ACL’s are applied to the external interface.
B. The host is denied before it enters the router.
It provides the best protection against an attacker.
The user-defined ACL’s are applied to the internal interface.
C. The host is denied before it enters the protected network.
The shun does not apply to the router itself.
The user-defined ACL’s are applied to the external interface.
D. The host is denied before it enters the protected network.
The best protection against an attack is provided.
The user-defined ACL’s are applied to the external interface.
Answer: B
QUESTION NO: 14
Match features with the appropriate descriptions.’