Which statement is true about the attack object database update process?
Which statement is true about the attack object database update process?
which command will indicate if log messages are being sent to Security Manager?
On a sensor, which command will indicate if log messages are being sent to Security Manager?
where do you look in Security Manager to see those alerts?
After you enable alerts for new hosts that are detected by the Enterprise Security Profiler, where do
you look in Security Manager to see those alerts?
which account do you use to login?
When connecting to a sensor using SSH, which account do you use to login?
Which OSI layer(s) of a packet does the IDP sensor examine?
Which OSI layer(s) of a packet does the IDP sensor examine?
Which two will change the management IP of an IDP sensor?
Which two will change the management IP of an IDP sensor? (Choose two.)
Which rule base would detect netcat?
Which rule base would detect netcat?
Which three fields in a packet must match an IDP rule before that packet is examined for an attack?
Which three fields in a packet must match an IDP rule before that packet is examined for an attack?
(Choose three.)
What is "a deviation from a protocol’s expected behavior or packet format"?
What is “a deviation from a protocol’s expected behavior or packet format”?
Which method do you use to do this?
A newly re-imaged sensor is running IDP 4.0 code. You want to assign IP address:
10.1.1.1 to the sensor. Which method do you use to do this?