Which of the following processes does an IDS perform?
An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform? Each correct answer represents a complete solution. (Choose all that apply.)A . Statistical analysis of abnormal traffic patterns.B...
What are these vulnerabilities?
You work as a Security Administrator for ABC Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application...
Which of the following rulebases will he use to accomplish the task?
David works as the Security Manager for ABC Inc. He has been assigned a project to detect the attacks over multiple connections and sessions and to count the number of scanned ports in a defined time period. Which of the following rulebases will he use to accomplish the task?A ....
Which of the following techniques is used to identify attacks originating from a botnet?
Which of the following techniques is used to identify attacks originating from a botnet?A . Recipient filteringB . BPF-based filterC . IFilterD . Passive OS fingerprintingView AnswerAnswer: D
Which of the following tools can he use to accomplish his task?
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He has successfully completed the following steps of the preattack phase: >> Information gathering >> Determining network range >> Identifying active machines >> Finding open ports and applications >> OS fingerprinting...
Which of the following rulebases will he use to accomplish the task?
Sam works as a Security Manager for ABC Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker. Which of the following rulebases will he use to accomplish the task?A ....
Which of the following is a valid IPv6 address?
Which of the following is a valid IPv6 address?A . 45CB . 6D53: 12CC . AFC7: E654: BB32: 54AT: FACED . 45CE . 6D53: 12CF . AFC7: E654: BB32: 543G . FACEH . 123.111.243.123 . 45C . 6D53: 12KP: AFC7: E654: BB32: 543 . FACEView AnswerAnswer: B
Which of the following are open-source vulnerability scanners? (Choose three.)
Which of the following are open-source vulnerability scanners? (Choose three.)A . NessusB . HackbotC . NiktoD . NetReconView AnswerAnswer: A,B,C
Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?
Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?A . HackbotB . NiktoC . NessusD . NmapView AnswerAnswer: B
Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. (Choose three.)
Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. (Choose three.)A . AnalyzeB . AcquireC . AuthenticateD . EncryptView AnswerAnswer: A,B,C