Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Datový list Strana 44

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 123
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 43
642-531
Answer: B, E
Page 12-13 CSIDS Courseware under Devices-Sensor Group
Note: When you create su/jointfilesconvert/394026/bgroups, the su/jointfilesconvert/394026/bgroup inherits the properties of either the parent group or
you may copy settings from another group to the new su/jointfilesconvert/394026/bgroup
QUESTION 101
Select the true statements regarding Sensor groups.
A. The mandatory check box exists in the context of a Sensor object to identify required configuration settings.
B. The override check box exists In the context of a Sensor Group object to prevent configuration parameters
from being inherited.
C. The override check box exists in the context of a Sensor object to override settings previously flagged as
mandatory.
D. By default, all Sensor su/jointfilesconvert/394026/bgroups inherit the configuration settings of other Sensors in the same Sensor group.
E. The mandatory check box exists in the context of a Sensor Group object to indicate that all fields in the
configuration windows require values.
Answer: B, D
"A sensor must, in fact, acquire settings from the parent group, if a parent defines those settings as mandatory.
A child cannot override the values for such settings."
(C) is false because of the keyword must in the statement above, so that a child cannot override values for
mandatory settings.
(B) Cisco Courseware 12-15 shows the "Override" checkbox in a screenshot.
(D) Cisco Courseware 12-12 shows a screenshot with the selection key:
O Default (use parent values)
(A) and (E) are false, because "mandatory" check boxes say nothing about "requirements", but if su/jointfilesconvert/394026/bgroups
must use the parameter or not (by overriding it):
Cisco Courseware 12-12:
QUESTION 102
You need to retrieve Sensor IP logs for analysis. Which of the following methods are available to you to
accomplish this task? (Choose all that apply.)
A. Download via IDM
B. Archive using SCP
C. Copy using FTP
D. Import to IDS MC
E. Upload using Security Monitor
Answer: A, C
Explanation:
Page 12-19 CSIDS Courseware under Automatic Logging
IP Log Files can be retrieved by the following methods
1) Use the CLI copy command to copy the IP log files to another host system using FTP or SCP.
Zobrazit stránku 43
1 2 ... 39 40 41 42 43 44 45 46 47 48 49 ... 122 123

Komentáře k této Příručce

Žádné komentáře