Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?
Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?A . ApacheB . SnortC . SSHD . SUDOView AnswerAnswer: D
You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.
You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.A ....
Which of the following applications cannot proactively detect anomalies related to a computer?
Which of the following applications cannot proactively detect anomalies related to a computer?A . NIDSB . HIDSC . Anti-virus scannerD . Firewall installed on the computerView AnswerAnswer: A
Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)
Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)A . Initiate rules of the rulebaseB . NotifyC . Drop/block sessionD . Close connectionView AnswerAnswer: B,C,D
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?A . Packet collisionB . Network enumeratingC . Packet craftingD . Distributed Checksum ClearinghouseView AnswerAnswer: C
Which of the following actions will the router take to route the incoming packet?
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet. Which of the following actions will the router take to route the incoming packet? Each correct answer represents a part of...
What is the most likely cause?
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch...
What is the name of this library?
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library. What is the name of this library?A . SysPCapB . libpcapC . WinPCapD . PCAPView...
Which of the following terms is used to represent IPv6 addresses?
Which of the following terms is used to represent IPv6 addresses?A . Colon-dotB . Dot notationC . Hexadecimal-dot notationD . Colon-hexadecimalView AnswerAnswer: D
Which of the following monitors program activities and modifies malicious activities on a system?
Which of the following monitors program activities and modifies malicious activities on a system?A . HIDSB . Back doorC . NIDSD . RADIUSView AnswerAnswer: A