1.
What is "a signature or protocol anomaly combined with context information"?
2.
How can you monitor real-time IP flows through the IDP sensor?
3.
Which statement is NOT true?
4.
What contains instructions on how the sensor should decode protocols?
5.
Which sensor process records unique network activity at layers 3, 4, and 7?
6.
Which interface does IDP use to communicate with Security Manager?
7.
In the Enterprise Security Profiler, what would you define under Permitted Objects?
8.
You have a rule in your IDP policy that detects all HTTP signatures that are targeted towards your Web server. You notice a log message is generated each time a Web user accesses the SQL database with the default passwords. Your Webmaster does not want to reprogram the Web page to use more secure SQL passwords. How do you disable alerts on this false positive?
9.
Which two statements about disk management on the IDP Sensor are true?
10.
Which statement is true about Packet Logging in IDP?