Datasheet

9E0 - 100
Leading the way in IT testing and certification tools, www.testking.com
- 66 -
Answer: A, C, F, G
Implement security solutions to stop or prevent unauthorized access or activities, and protect
information – authentication – encryption – firewalls – vulnerability patching
- Cisco Secure Intrusion Detection System 4 chap 2 page 14
QUESTION NO: 51
Which statement about the creation of different signature template is TRUE?
A. You can change settings, and then revert to a previous version.
B. You can change settings, but you cannot revert a previous version.
C. It is impossible to maintain multiple version of the signature settings.
D. You can experiment with different settings, but you must re-create the signature-
template.
Answer: A
QUESTION NO: 52
What do you define internal networks within CSIDS?
A. To add internal network definitions.
B. To add external network definitions.
C. To allow CSPM to associate alarm locations as IN and OUT.
D. To log all alarm outside (OUT) to outside (OUT) attacks.
Answer: C
QUESTION NO: 53
What are the purposes of the ports on the catalyst 6000 IDSM?
A. Port 1 is a trunking port, port 2 is assigned as the destination capture for VLAN
ACL’s.
B. Port 1 is for monitoring the network for attacks, Port 2 is the command and control
port for the communicating with the Directors software.
C. Port 1 is the command and control port for communicating with the Director Software,
Port 2 is for monitoring the network attacks.
D. Port 1 is assigned an IP address during the initial IDSm setup, Port 2 is assigned as the
destination capture for VLAN ACL’s and is a trunking port.
Answer: B
Understand that in ealier revision of the course that the answer above maybe correct, however
as of version 4 this answer would not be correct.