Want to pass your IDP, Associate(JNCIA-IDP) JN0-541 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
Which method of detection does IDP Sensor use to detect rootkits or Trojans present on internal systems?
A. Protocol Anomaly
B. NetworkHoneypot
C. Stateful Signatures
D. Backdoor Detection
What does the Host Watch List monitor?
A. the number of attacks targeted to specified hosts
B. the number of attacks initiated from specified hosts
C. all sessions directed to specified hosts
D. the status of specified hosts
You implement Traffic Anomaly detection and you find numerous alerts of portscans from your Security Auditing team that you want to ignore. What is the appropriate action to take?
A. create a rule on top of Traffic Anomalyrulebase to ignore traffic from "Security Audit Team"
B. create a rule on top of Mainrulebase to ignore traffic with "from the Security Audit Team" and make this a Terminal rule
C. create a rule on top of Traffic Anomalyrulebase to ignore traffic with a "from the Security Audit Team" and make this a Terminal rule
D. create an Exempt rule for the Security Audit team in the Exempt to ignore Traffic Anomalies