Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Ficha de datos Pagina 67

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 168
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 66
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 67 -
The goal of defining these reassembly settings is to ensure that the sensor does not allocate all
of its resources to datagrams that cannot be completely reconstructed, either because the
sensor missed some frame transmissions or because an attack is generating random
fragmented datagrams.
To specify that the sensor track only sessions for which the three-way handshake is
completed, select the TCP Three Way Handshake check box.
Reference: Tuning Sensor Configurations
QUESTION NO: 3
Which TCP session reassembly configuration parameter enforces that a valid TCP
session be establish before the Cisco IDS Sensor’s sensing engine analyzes the traffic
associated with the session?
A. TCP open establish timeout
B. TCP embryonic timeout
C. TCP closed timeout
D. TCP three way handshake
E. TCP sequence timeout
Answer: D
Explanation:
Select the TCP three way handshake if you want the sensor to tack only those sessions for
which the three-way handshake is completed. The other options for reassembly are:
No reassembly
Loose reassembly
Strict reassembly
Reference: Cisco Secure Intrusion Detection System (Ciscopress) page 419
Section 2: Configure a signature's enable status, severity level, and
action (2 questions)
QUESTION NO: 1
When configuring a custom signature via the IDM Signature Wizard, you must choose a
signature type from one of three categories. What are those categories? Choose three.
A. HTTP signatures
B. HTTPS signatures
C. web server signatures
D. packet signatures
E. stream signatures
F. FTP server signatures
Vista de pagina 66
1 2 ... 62 63 64 65 66 67 68 69 70 71 72 ... 167 168

Comentarios a estos manuales

Sin comentarios