
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 143 -
- Org ID
- Port
- Heartbeat
Note: …only required if running an IDS software version earlier than 4.0 (PostOffice).
Page 612 Cisco Press CCSP CSIDS 2nd edition under Adding IOS Devices
Cisco Courseware 16-14
Section 6: Use the reporting features of the Security Monitor (0
questions)
Section 7: Administer the Security Monitor server (1 question)
QUESTION NO: 1
Which three specify the predefined rules for database maintenance in the Monitoring
Center for Security? (Choose three.)
A. default pruning
B. default IP log pruning
C. default SNMP pruning
D. default Syslog
E. default audit log pruning
F. default SQL database pruning
ANSWER: A, D, E
Explanation:
The Security Monitor enables you to launch a notification, trigger a script, or sent an e-mail
when a database rule is triggered. These database rules can be triggered when the Security
Monitor database reaches a certain size, a number of events happen, or on a daily basis.
The Security Monitor comes with three predefined rules for database maintenance:
1) Default pruning – Default pruning for alarm tables when the database reaches
2,000,000 total events.
2) Default Syslog pruning – Default pruning for Syslog tables when a database reaches
2,000,000 total events.
3) Default audit log pruning – Default pruning for audit log pruning performed on a daily
basis.
Reference: CSIDS Student Guide v4.0 p.16-63
Cisco Courseware 16-63
Comentarios a estos manuales