Cisco IDS/IPS Fundamentals Flashcards
Which method should you implement when it is not acceptable for an attack to reach its intended victim?
IPS
A company has hired you to determine whether attacks are happening against the server farm, and it does not want any additional delay added to the network. Which deployment method should be used?
IDS
Why does IPS have the ability to prevent an ICMP-based attack from reaching the intended victim?
The IPS is inline with the traffic
Which method of IPS uses a baseline of normal network behavior and looks for deviations from that baseline?
Anomaly-based IPS
Which type of implementation required custom signatures to be created by the administrator?
Policy-based IPS
Which method requires participation in global correlation involving groups outside your own enterprise?
Reputation-based IPS
Which if the micro-engines contains signatures that can only match on a single packet, as opposed to a flow of packets?
Atomic
Which properties directly associated with a signature?
ASR, SFR
Is assigning aggressive IPS responses to specific signatures best practices?
True
What is the name of Cisco cloud-based services for IPS correlation?
SIO
Name three Next-Generation IPS (NGIPS) solution?
NGIPSv, ASA with FirePOWER, FirePOWER 8000 series appliances