1: | List two weaknesses of the signature-based IDS. |
2: | Why does the deployment of a policy-based IDS take a long time? |
3: | Which IDS is not limited by bandwidth restrictions or data encryption? |
4: | Which IDS is very challenging in a switched environment? |
5: | Name the two main components of a Cisco host IDS. |
6: | Name the two interfaces of a network IDS. |
7: | What are the three main components of a network IDS? |
8: | List three responses to events or alerts. |
9: | What two processes are in place to automate sensor maintenance? |
10: | The RDEP protocol communication consists of what two message types? |