Download as odt, pdf, or txt
Download as odt, pdf, or txt
You are on page 1of 2

Name:

What are the 5 modules/devices that compose the UES? Give their functions.
1.

2.

3.

4.

5.

What is the port used by eTunnel and its main use?

What is the port used so that syslogs can be forwarded to the FSM module?

You wanted to forward logs to FSM in the customer ITI. What IP address are you going to use in setting
up your nxlog?

What is the IDS engine that the UES uses to generate signature alerts?

What is the scanning engine that the VSM uses for vulnerability assessments?
Give the basic definition of signature detection/alert and its advantages and disadvantages.

Give the basic definition of anomaly (behavioral) detection/alert and its advantages and disadvantages.

What filter are we using in tuning out ESP alerts?

Also, what filter are we using in tuning out SIG alerts?

You might also like