Which statement is true about the attack object database update process?
On a sensor, which command will indicate if log messages are being sent to Security Manager?
After you enable alerts for new hosts that are detected by the Enterprise Security Profiler, where do
you look in Security Manager to see those alerts?
When connecting to a sensor using SSH, which account do you use to login?
Which OSI layer(s) of a packet does the IDP sensor examine?
Which two will change the management IP of an IDP sensor? (Choose two.)
Which rule base would detect netcat?
Which three fields in a packet must match an IDP rule before that packet is examined for an attack?
What is “a deviation from a protocol’s expected behavior or packet format”?
A newly re-imaged sensor is running IDP 4.0 code. You want to assign IP address:
10.1.1.1 to the sensor. Which method do you use to do this?