When an IDS generates an alert for a correctly detected network attack, what is this event called?

When an IDS generates an alert for a correctly detected network attack, what is this event called?A . false positiveB . true negativeC . true positiveD . false negativeView AnswerAnswer: C

February 11, 2019 No Comments READ MORE +

Which protocol is typically considered critical for LAN operation?

Which protocol is typically considered critical for LAN operation?A . BGPB . ARPC . SMTPD . GREView AnswerAnswer: B

February 5, 2019 No Comments READ MORE +

Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)

Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.) A. Completely disconnect the network from the Internet. B. Deploy a stateful edge firewall. C. Buy an insurance policy A. against attack-related business losses. D. Implement a password management...

February 5, 2019 No Comments READ MORE +

Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)

Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.) A. Completely disconnect the network from the Internet. B. Deploy a stateful edge firewall. C. Buy an insurance policy A. against attack-related business losses. D. Implement a password management...

February 4, 2019 No Comments READ MORE +

Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)

Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)A . Verify user login credentials.B . Troubleshoot firewall performance.C . Monitor database applications.D . Create security policies on routers.View AnswerAnswer: B,D

January 29, 2019 No Comments READ MORE +

Which protocol is used in this network traffic flow?

Refer to the exhibit. Which protocol is used in this network traffic flow?A . SNMPB . SSHC . DNSD . TelnetView AnswerAnswer: B

January 27, 2019 No Comments READ MORE +

Which two types of data are relevant to investigating network security issues? (Choose two.)

Which two types of data are relevant to investigating network security issues? (Choose two.)A . NetFlowB . device model numbersC . syslogD . routing tablesE . private IP addressesView AnswerAnswer: A,C

January 26, 2019 No Comments READ MORE +

When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)

When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)A . product serial numberB . MAC addressC . IP addressD . product model numberE . broadcast addressView AnswerAnswer: B,C

January 22, 2019 No Comments READ MORE +

Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)

Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)A . Verify user login credentials.B . Troubleshoot firewall performance.C . Monitor database applications.D . Create security policies on routers.View AnswerAnswer: B,D

January 17, 2019 No Comments READ MORE +

When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)

When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)A . product serial numberB . MAC addressC . IP addressD . product model numberE . broadcast addressView AnswerAnswer: B,C

January 17, 2019 No Comments READ MORE +