IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

IBM Specialist 000-561 덤프자료

Pass4Test는 많은 분들이 IT인증시험을 응시하여 성공하도록 도와주는 사이트입니다.  Pass4Test 는 많은 IT전문가들로 구성되었습니다. Pass4Test 의 덤프는 모두 엘리트한 전문가들이 만들어낸 만큼 시험문제의 적중률은 아주 높습니다. 거의 100%의 정확도를 자랑하고 있습니다. 아마 많은 유사한 사이트들도 많습니다. 이러한 사이트에서 학습가이드와 온라인서비스도 지원되고 있습니다만  Pass4Test 는 이미 이러한 사이트를 뛰어넘은 실력으로 업계에서는 우리만의 이미지를 지키고 있습니다. Pass4Test 는정확한 문제와 답만 제공하고 또한 그 어느 사이트보다도 빠른 업데이트로 여러분의 인증시험을 안전하게 패스하도록합니다.

Pass4Test 는 인증시험에 참가하는 분들한테 편리를 제공하는 사이트이며,여러분들의 시험패스에 도움을 줄 수 있는 사이트입니다.많은 분들은     IBM Specialist 000-561   인증시험이 아주 어려운 것은 알고 있습니다. 하지만 Pass4Test를 선택함으로    IBM Specialist 000-561  인증시험은 그렇게 어렵지 않다는 것을 알게 될 것입니다. Pass4Test의   IBM Specialist 000-561  학습가이드는 시험의 예상문제부터 전면적이로 만들어진 아주 퍼펙트한 시험자료입니다.Pass4Test는 여러분이    IBM Specialist 000-561  인증시험 패스와 추후사업에 모두 도움이 되겠습니다.  Pass4Test제품을 선택함으로 여러분은 시간도 절약하고 돈도 절약하는 일석이조의 득을 얻을수 있습니다. 또한 구매후 일년무료 업데이트 버전을 받을수 있는 기회를 얻을수 있습니다.  IBM Specialist 000-561  인증시험패스는 아주 어렵습니다. 자기에 맞는 현명한 학습자료 선택은 성공의 지름길을 내딛는 첫발입니다.

 

 

NO.1 What are two purposes for the Quarantine Rules in the Response Tuning page in the Local
Management Interface? (Choose two.)
A. add new quarantine rules
B. set network configuration options
C. temporarily disable a quarantine rule
D. review rules generated in response to intruder events
E. define how the appliance should send notifications when it detects an intrusion in the network
Answer: A,D

NO.2 Where is the provinfo file stored?
A. /var/cache
B. /var/support/
C. root directory
D. admin directory
Answer: B

NO.3 Which two user notification response object types are available in IBM Security Network Intrusion
Prevention System V4.3? (Choose two.)
A. SMS
B. E-mail
C. Remedy
D. Voicemail
E. SNMP Trap/Inform
Answer: B,E

NO.4 Where in the Local Management Interface is the location of the date and time of the last backup of an
IBM Security Network Intrusion Prevention System V4.3 viewable?
A. Evidence log
B. Message log
C. System Dashboard
D. Security Dashboard
Answer: C

NO.5 Which interface mode is required in order for quarantine response rules to work?
A. Bypass Mode
B. Inline Protection Mode
C. Inline Simulation Mode
D. Passive Monitoring Mode
Answer: B

NO.6 Where would a user be added to allow a remote user to access the IBM Security Network Intrusion
Prevention System V4.3 Local Management Interface?
A. the Remote Access policy in IBM Security SiteProtector System (SiteProtector)
B. the User Management utility in SiteProtector
C. the Accounts and Passwords page in the Web interface
D. the Password Management menu in the SSH Configuration menu
Answer: C

NO.7 How is a firewall rule configured to block remote desktop (RDP) access for all interfaces and all Virtual
Local Area Networks.?
A. protocol=TCP, source port exclude RDP
B. action=ignore, select Interfaces, protocol=TCP, port=3389
C. keep all default settings but change the target port to 3389
D. action=drop, protocol=UDP, target port uncheck any and enter 3389
Answer: C

NO.8 Which area of the IBM Protocol Analysis Module technology prevents Skype from using enterprise
network bandwidth?
A. Data Security
B. Application Control
C. Threat Detection and Prevention
D. Client-side Application Protection
Answer: B

NO.9 What are two restrictions placed on remote users using IBM Security Network Intrusion Prevention
System V4.3? (Choose two.)
A. They cannot reboot the appliance.
B. They cannot log in to the local console.
C. They cannot change the local user account passwords.
D. They cannot save changes to policies in the Web interface.
E. They cannot log in to the appliance when the authentication server is down.
Answer: C,E

NO.10 Where in the IBM Security SiteProtector System Console can a customer find the link status of the
Security Interfaces on an IBM Security Network Intrusion Prevention System appliance?
A. the networkinfo section under Module Status in the appliance Properties screen
B. the Intrusion Prevention section under Module Status in the appliance Properties screen
C. the Security Interfaces section on the Health Summary Network tab in the appliance Properties screen
D. the Internal Communication section on the Health Summary System tab in the appliance Properties
screen
Answer: A

NO.11 Log Evidence is enabled for an event and an administrator wants to review the packet content. Where
in the Local Management Interface is this log file downloaded?
A. under Security Settings, select the policy that logs the event, click on Download Log, and the save file
B. select Review, under Downloads select Logs and Packet Captures, select the files, and click Download
C. on the Security Dashboard, click the Evidence Logs link, click all files related to the event, and save the
files
D. select Home Dashboard, scroll down to the section on evidence logs, select the log file(s), and click
Download
Answer: B

NO.12 Which file is accessed on the IBM Security Network Intrusion Prevention System V4.3 appliance to
determine why it is Active with Errors in IBM Security SiteProtector System?
A. Boot log file
B. Kernel log file
C. Engine0 log file
D. Messages log file
Answer: D

NO.13 A customer wants to change the severity of an IBM Protocol Analysis Module signature from high to low
in a given protection domain. Which policy meets this requirement?
A. Security Events
B. Open Signatures
C. System Updates
D. X-Force Virtual Patch
Answer: A

NO.14 Virtual Local Area Network (VLAN) exclusions have been added to a Protection Domain, however
events from those VLANs seem to be generated anyway. What is the most likely cause?
A. A VLAN cannot be excluded in a custom Protection Domain.
B. Multiple VLANs cannot be excluded in a custom Protection Domain.
C. Incorrect interfaces have been specified in a custom Protection Domain.
D. The same exception has not been created on the Global Protection Domain.
Answer: C

NO.15 Which file can be imported or compiled, and defines the format of SNMP traps for security events
responses in the IBM Security Network Intrusion Prevention System appliance?
A. iss.mib
B. ibm.mib
C. linux.mib
D. snmp.mib
Answer: A

 
Posted 2013/2/4 4:12:27  |  Category: 미분류  |  Tag: