Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Ficha de datos Pagina 143

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 168
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 142
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 143 -
- Org ID
- Port
- Heartbeat
Note: …only required if running an IDS software version earlier than 4.0 (PostOffice).
Page 612 Cisco Press CCSP CSIDS 2nd edition under Adding IOS Devices
Cisco Courseware 16-14
Section 6: Use the reporting features of the Security Monitor (0
questions)
Section 7: Administer the Security Monitor server (1 question)
QUESTION NO: 1
Which three specify the predefined rules for database maintenance in the Monitoring
Center for Security? (Choose three.)
A. default pruning
B. default IP log pruning
C. default SNMP pruning
D. default Syslog
E. default audit log pruning
F. default SQL database pruning
ANSWER: A, D, E
Explanation:
The Security Monitor enables you to launch a notification, trigger a script, or sent an e-mail
when a database rule is triggered. These database rules can be triggered when the Security
Monitor database reaches a certain size, a number of events happen, or on a daily basis.
The Security Monitor comes with three predefined rules for database maintenance:
1) Default pruning – Default pruning for alarm tables when the database reaches
2,000,000 total events.
2) Default Syslog pruning – Default pruning for Syslog tables when a database reaches
2,000,000 total events.
3) Default audit log pruning – Default pruning for audit log pruning performed on a daily
basis.
Reference: CSIDS Student Guide v4.0 p.16-63
Cisco Courseware 16-63
Vista de pagina 142
1 2 ... 138 139 140 141 142 143 144 145 146 147 148 ... 167 168

Comentarios a estos manuales

Sin comentarios