Chapter 11
A1: | b, d |
A2: | b, c |
A3: | c, e |
A4: | e |
A5: | c |
A6: | c, e |
A7: | b |
A8: | b, c |
A9: | a, b, d |
A10: | b, d |
A11: | b |
A12: | b |
A13: | b |
Q&A
1: | Define IDS. |
A1: | IDS is a system that monitors all inbound and outbound network activity on selected segments within a network and looks for predetermined patterns or signatures of traffic flow that may indicate a network or system attack from someone attempting to break into or compromise a system. |
2: | What protocol do Cisco Secure IDS devices use to communicate with each other? |
A2: | Post Office Protocol |
3: | Traditionally, what devices provided perimeter security? |
A3: | Firewalls |
4: | What are the three types of responses that a sensor can perform in reply to an attack? |
A4: | TCP resetIP blocking or shunningIP logging |
5: | What are the perimeter security features provided by a Cisco router? |
A5: | Control of TCP/IP servicesExtensive ACL functionalityNetwork Address TranslationIPSec support |
6: | Define a perimeter. |
A6: | A perimeter usually exists where a private network meets a public network. It can also be found internally in a private network where sensitive data may need to be protected from unauthorized access. However, more commonly, it is just thought of as the entry point into a network for connections that are not to be trusted. |
7: | Network sensing, attack response, and device management are functions of what device? |
A7: | Cisco Secure IDS sensor |
8: | Define stateful packet filtering. |
A8: | Stateful packet filtering limits information into a network based not only on the destination and source address but also on the packet data content. |
9: | Describe some of the features provided by CSA. |
A9: | Host intrusion preventionDistributed firewall capabilitiesMalicious mobile code protectionOperating system integrity assuranceAudit log consolidation |