Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic.

Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic. He can mark this alert as:A . False-NegativeB . False-PositiveC . True-PositiveD . False-Signature View Answer Answer: A...

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanning View Answer Answer: B...

Which of the following provides a security professional with most information about the system’s security posture?

Which of the following provides a security professional with most information about the system’s security posture?A . Wardriving, warchalking, social engineeringB . Social engineering, company site browsing, tailgatingC . Phishing, spamming, sending trojansD . Port scanning, banner grabbing, service identification View Answer Answer: D...