Which method of detection does IDP Sensor use to detect rootkits or Trojans present on internal systems?
Which method of detection does IDP Sensor use to detect rootkits or Trojans present on internal
systems?
Which method of detection does IDP Sensor use to detect a network scan or portscan?
Which method of detection does IDP Sensor use to detect a network scan or portscan?
Which two statements are true about Trojans?
Which two statements are true about Trojans? (Choose two.)
What are three functions of the IDP Management Server?
What are three functions of the IDP Management Server? (Choose three.)
What is a buffer overflow attack?
What is a buffer overflow attack?
Which statements are true about the IDP Management Server?
Which statements are true about the IDP Management Server? (Choose two.)
Which IDP Sensors support the NetScreen IDP bypass unit?
Which IDP Sensors support the NetScreen IDP bypass unit? (Choose two.)
which two operating systems can the IDP Management Server be installed?
On which two operating systems can the IDP Management Server be installed?
(Choose two.)
Which command verifies the IDP Management Server process?
Which command verifies the IDP Management Server process?
What is the function of the Device Monitor?
What is the function of the Device Monitor?