What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to...
Which of the following options can be useful to ensure the integrity of the data?
The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information...
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?A . ESP transport modeB . ESP confidentialC . AH permiscuousD . AH Tunnel modeView AnswerAnswer: A
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
Which regulation defines security and privacy controls for Federal information systems and organizations?
Which regulation defines security and privacy controls for Federal information systems and organizations?A . HIPAAB . EU Safe HarborC . PCI-DSSD . NIST-800-53View AnswerAnswer: D Explanation: NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems except those related to national security....
In what kind of system would you find the following string of characters used as a rule within its configuration?
You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)A . A firewall IPTableB . FTP Server ruleC...
Which of the following is a low-tech way of gaining unauthorized access to systems?
Which of the following is a low-tech way of gaining unauthorized access to systems?A . Social EngineeringB . EavesdroppingC . ScanningD . SniffingView AnswerAnswer: A
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following programs is usually targeted at Microsoft Office products?A . Polymorphic virusB . Multipart virusC . Macro virusD . Stealth virusView AnswerAnswer: C Explanation: A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application...
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?A . Macro virusB . Stealth/Tunneling virusC . Cavity virusD . Polymorphic virusView AnswerAnswer: B
What is a “Collision attack” in cryptography?
What is a “Collision attack” in cryptography?A . Collision attacks try to get the public keyB . Collision attacks try to break the hash into three parts to get the plaintext valueC . Collision attacks try to break the hash into two parts, with the same bytes in each part...