Datasheet

9E0 - 100
Leading the way in IT testing and certification tools, www.testking.com
- 67 -
The IDSM2 has the following four logical ports
Port 1 –tcp reset
Port 2 – Command and control
Port 7 or 8 Monitoring
- Cisco Secure Intrusion Detection System 4 chap 17 page 10
QUESTION NO: 54
Why should you consider network entry points when designing IP blocking?
A. They prevent all denial of attacks.
B. They are considered critical hosts and should not be blocked.
C. They provide different avenues for the attacker to attack your network.
D. They provide a method for the sensor to route through the subnet to the managed
router.
Answer: C
It is recommended that Sensors be placed at those network entry and exit points that provide
sufficient intrusion detection coverage. Cisco Secure Intrusion Detection System 4 chap 4
page 37
QUESTION NO: 55
In the sensing tab, which pull down menu assigns signature templates to a sensor?
A. set span disable
B. set security acl ip
C. acl configuration default
D. active configuration default
Answer: D
QUESTION NO: 56
Place the methods for deleting alarms next to the descriptions: