|
plz add it thanks buddy
|
Question 1. The attack category is for events that A. Attempt to discover weaknesses B. Map the structure of the network C. Have the potential to compromise the integrity of an end system. D. Deny access to resources Answer: C Question 2. Virtual Sensors can segregate traffic by? A. IP Address, VLAN, Port B. IP Address, VLAN, Port, Protocol C. IP Address, VLAN, Port, Protocol, Application D. IP Address, VLAN, Port, Application Answer: B Question 3. In an Event Flow Processor (EFP) a consumer can be? A. A Sensor or an Event Channel B. An Event channel only C. An Event channel or an Agent D. An Agent only Answer: C Question 4. Before the host Sensor can be deployed A. It must be associated with a virtual sensor B. It must be associated with a host policy C. Its key must be added to the /usr/dragon/bin directory D. Its address must be added to /etc/hosts Answer: B Question 5. Which of the following Dragon Agents is used for detecting changes to host files? A. Real Time Console B. MD5 Sum C. Alarm Tool D. Database Answer: B Question 6. In a standalone deployment the system will have? A. A net-config-client.xml file B. A net-config-server.xml file C. A net-config-server.xml and a net-con fig-client.xml file D. A net-config-server.xml, a net-con fig-client.xml and a net-config-reports.xml file Answer: C Question 7. MD5 checksums are A. Stored in a protected directory on the host B. Appended to the protected file C. Passed up the event channel to the MD5 Agent D. Stored in the /usr/dragon/bin directory on the Enterprise Management Server (EMS) Answer: C Question 8. Which of the following best describes the commit operation? A. It uses the configuration channel to push a configuration to a device B. It uses the event channel to push a configuration to a device C. It writes a configuration change to the Enterprise Management Server (EMS) database D. It writes a configuration change to the management clients database Answer: C Question 9. Which of the following Dragon Agents sends notifications when the sensors detect an event that match a rule? A. Real Time Console B. MD5 Sum C. Alarm Tool D. Database Answer: C Question 10. Signature OS A. Applies signature to network traffic originating from the specified OS B. Is used for writing Host signatures C. Is optional on Network signatures D. Is required on all signatures Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.