Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Ficha de datos Pagina 78

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 168
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 77
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 78 -
C. Router runs the packet against ACL, tags it for drop action, forwards the packet to
the NM-CIDS and drops it if it triggers any signature, even a signature with no action
configured.
D. Router runs packet against ACL, forwards packet to NM-CIDS for inspection, only if
it is an ICMP packet , and then drops the packet.
Answer: B
QUESTION NO: 5
Which of the following represents the best description of a post-block ACL on an IDS
blocking device?
A. ACL applied to a managed interface once an attack has been detected.
B. ACL entries applied to the end of the active ACL after blocking entries.
C. ACL used to block traffic on the inbound direction of a managed interface
D. ACL used to block traffic on the internal (trusted) interface of a managed device.
E. ACL used to block traffic on the external (untrusted) interface of a managed device
Answer: B
Explanation:
If you want to change the ACL generated by the Sensor, you can specify either Pre-block or
Post-block ACLs. The Pre-block ACL designates ACL entries that the Sensor should place in
the beginning of the new ACL, before the addition of any Sensor blocking, deny, entries for
the addresses and, or connections being blocked. The Post-block ACL designates ACL entries
that the Sensor should place after the Sensor blocking entries.
QUESTION NO: 6
Which type of ACL is allowed when implementing the Cisco IDS IP blocking feature
pre-shun ACLs?
A. Named IP extended
B. Named IP standard
C. Numbered IPX standard
D. Numbered IPX extended
E. Named IPX extended
Answer: A
Explanation: A pre-block and post-block ACL must be an extended IP ACL, named or
unnumbered. They should be configured on the device Sensor block is configured for that
interface/direction Cisco Secure Intrusion Detection System 4 chap 15 page 15
QUESTION NO: 7
Vista de pagina 77
1 2 ... 73 74 75 76 77 78 79 80 81 82 83 ... 167 168

Comentarios a estos manuales

Sin comentarios