IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

IBM Specialist 000-561 (IBM Security Network Intrusion Prevention System V4.3 Implem) 인증

Pass4Test 는 완전히 여러분이 인증시험 준비와 안전한 시험패스를 위한 완벽한 덤프제공 사이트입니다.우리 Pass4Test의 덤프들은 응시자에 따라 ,시험 ,시험방법에 따라  알 맞춤한 퍼펙트한 자료입니다.여러분은 Pass4Test의 알맞춤 덤프들로 아주 간단하고 편하게  인증시험을 패스할 수 있습니다.많은  it인증관연 응시자들은  우리 Pass4Test가 제공하는 문제와 답으로 되어있는 덤프로 자격증을 취득하셨습니다.우리 Pass4Test 또한 업계에서 아주 좋은 이미지를 가지고 있습니다.

 

인재도 많고 경쟁도 많은 이 사회에, IT업계 인재들은 인기가 아주 많습니다.하지만 팽팽한 경쟁률도 무시할 수 없습니다.많은  IT인재들도 어려운 인증시험을 패스하여 자기만의 자리를 지켜야만 합니다.우리 Pass4Test에서는 마침 전문적으로 이러한 IT인사들에게 편리하게 시험을 패스할수 있도록 유용한 자료들을 제공하고 있습니다.  IBM Specialist 000-561 (IBM Security Network Intrusion Prevention System V4.3 Implem)  인증은 아주 중요한 인증시험중의 하나입니다.

 

Pass4Test에서는 이미   IBM Specialist 000-561 (IBM Security Network Intrusion Prevention System V4.3 Implem)   인증시험의 일부 문제와 답을 사이트에 올려놓았으니 체험해보실 수 있습니다. Pass4Test 의  IBM Specialist 000-561 (IBM Security Network Intrusion Prevention System V4.3 Implem)   덤프에 신뢰가 갈 것이며 또 망설임 없이 선택하게 될 것입니다.  Pass4Test  덤프로 여러분은 한번에 시험을 패스할 수 있으며 또 개인시간도 절약하고 무엇보다도 금전상으로 절약이 제일 크다고 봅니다.

 

 

NO.1 A customer wants to change the severity of an IBM Protocol Analysis Module signature from high to low
in a given protection domain. Which policy meets this requirement?
A. Security Events
B. Open Signatures
C. System Updates
D. X-Force Virtual Patch
Answer: A

NO.2 Which file is accessed on the IBM Security Network Intrusion Prevention System V4.3 appliance to
determine why it is Active with Errors in IBM Security SiteProtector System?
A. Boot log file
B. Kernel log file
C. Engine0 log file
D. Messages log file
Answer: D

NO.3 Which area of the IBM Protocol Analysis Module technology prevents Skype from using enterprise
network bandwidth?
A. Data Security
B. Application Control
C. Threat Detection and Prevention
D. Client-side Application Protection
Answer: B

NO.4 Where in the Local Management Interface is the location of the date and time of the last backup of an
IBM Security Network Intrusion Prevention System V4.3 viewable?
A. Evidence log
B. Message log
C. System Dashboard
D. Security Dashboard
Answer: C

NO.5 Which file can be imported or compiled, and defines the format of SNMP traps for security events
responses in the IBM Security Network Intrusion Prevention System appliance?
A. iss.mib
B. ibm.mib
C. linux.mib
D. snmp.mib
Answer: A

NO.6 What are two purposes for the Quarantine Rules in the Response Tuning page in the Local
Management Interface? (Choose two.)
A. add new quarantine rules
B. set network configuration options
C. temporarily disable a quarantine rule
D. review rules generated in response to intruder events
E. define how the appliance should send notifications when it detects an intrusion in the network
Answer: A,D

NO.7 Virtual Local Area Network (VLAN) exclusions have been added to a Protection Domain, however
events from those VLANs seem to be generated anyway. What is the most likely cause?
A. A VLAN cannot be excluded in a custom Protection Domain.
B. Multiple VLANs cannot be excluded in a custom Protection Domain.
C. Incorrect interfaces have been specified in a custom Protection Domain.
D. The same exception has not been created on the Global Protection Domain.
Answer: C

NO.8 Which two user notification response object types are available in IBM Security Network Intrusion
Prevention System V4.3? (Choose two.)
A. SMS
B. E-mail
C. Remedy
D. Voicemail
E. SNMP Trap/Inform
Answer: B,E

NO.9 What are two restrictions placed on remote users using IBM Security Network Intrusion Prevention
System V4.3? (Choose two.)
A. They cannot reboot the appliance.
B. They cannot log in to the local console.
C. They cannot change the local user account passwords.
D. They cannot save changes to policies in the Web interface.
E. They cannot log in to the appliance when the authentication server is down.
Answer: C,E

NO.10 Log Evidence is enabled for an event and an administrator wants to review the packet content. Where
in the Local Management Interface is this log file downloaded?
A. under Security Settings, select the policy that logs the event, click on Download Log, and the save file
B. select Review, under Downloads select Logs and Packet Captures, select the files, and click Download
C. on the Security Dashboard, click the Evidence Logs link, click all files related to the event, and save the
files
D. select Home Dashboard, scroll down to the section on evidence logs, select the log file(s), and click
Download
Answer: B

NO.11 Where in the IBM Security SiteProtector System Console can a customer find the link status of the
Security Interfaces on an IBM Security Network Intrusion Prevention System appliance?
A. the networkinfo section under Module Status in the appliance Properties screen
B. the Intrusion Prevention section under Module Status in the appliance Properties screen
C. the Security Interfaces section on the Health Summary Network tab in the appliance Properties screen
D. the Internal Communication section on the Health Summary System tab in the appliance Properties
screen
Answer: A

NO.12 How is a firewall rule configured to block remote desktop (RDP) access for all interfaces and all Virtual
Local Area Networks.?
A. protocol=TCP, source port exclude RDP
B. action=ignore, select Interfaces, protocol=TCP, port=3389
C. keep all default settings but change the target port to 3389
D. action=drop, protocol=UDP, target port uncheck any and enter 3389
Answer: C

NO.13 Where is the provinfo file stored?
A. /var/cache
B. /var/support/
C. root directory
D. admin directory
Answer: B

NO.14 Which interface mode is required in order for quarantine response rules to work?
A. Bypass Mode
B. Inline Protection Mode
C. Inline Simulation Mode
D. Passive Monitoring Mode
Answer: B

NO.15 Where would a user be added to allow a remote user to access the IBM Security Network Intrusion
Prevention System V4.3 Local Management Interface?
A. the Remote Access policy in IBM Security SiteProtector System (SiteProtector)
B. the User Management utility in SiteProtector
C. the Accounts and Passwords page in the Web interface
D. the Password Management menu in the SSH Configuration menu
Answer: C
Posted 2012/12/3 8:59:01  |  Category: 미분류  |  Tag: