1.
On a sensor, which command will indicate if log messages are being sent to Security Manager?
2.
Which OSI layer(s) of a packet does the IDP sensor examine?
3.
Which rule base would detect netcat?

 
4.
Which three fields in a packet must match an IDP rule before that packet is examined for an attack? (Choose three.)
5.
Which TCP port is used for communication between Security Manager and an IDP sensor?
6.
Which three actions must be taken prior to deploying an IDP sensor (in transparent mode) in a network?
7.
What is "a unique pattern that always exists within an attack"?
8.
Which sensor command can be used to determine if profiler data is being sent to Security Manager?
9.
Which sensor process handles all communication between the sensor and Security Manager?
10.
Given the following steps: