Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Ficha de datos Pagina 3

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 123
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 2
642-531
A. a means of network access
B. prior access to the target
C. previously installed root kit
D. username and password
Answer: A
DOS attacks are performed by flooding the network, so the only requirement is access to the network.
C, the requirement of installing tools to perform distributed attacks (whatever a root toolkit may be) is only true
for DDOS attacks.
As the aim is not to gain access no usernames or passwords (D), and even no prior access to the target host (B)
is required.
Page 2-28 CIDS Courseware v4.0
QUESTION 6
Which value can be assigned to define the Cisco IDS 4210 Sensor's sensing interface?
A. Auto
B. Detect
C. Probe
D. Sniffing
E. Select
Answer: D
Explanation:
An individual sensor contains two separate interfaces. The sensor used on of the interfaces to passively sniff all
the network packets by placing the interface in Promiscuous mode. The sensor uses the other network interface
for command and control traffic.
Reference:Cisco Secure Intrusion Detection System (Ciscopress) page 98
QUESTION 7
What reconnaissance methods are used to discover servers running SMTP and SNMP? (Choose two)
A. TCP scans for port 25
B. UDP scans for port 25
C. UDP scans for port 161
D. ICMP sweeps for port 25
E. ICMP sweeps for port 161
Answer: A, C
Explanation:
If the public SMTP server were compromised, a hacker might try to attack the internal mail server over TCP
port 25, which is permitted to allow mail transfer between the two hosts.
SNMP is a network management protocol that can be used to retrieve information from a network device
(commonly referred to as read-only access) or to remotely configure parameters on the device (commonly
Vista de pagina 2
1 2 3 4 5 6 7 8 ... 122 123

Comentarios a estos manuales

Sin comentarios