What command will he use to check the ports applications open?
Alex is administrating the firewall in the organization's network. What command will he use to check the ports applications open?A . Netstat -anB . Netstat -oC . Netstat -aD . Netstat -aoView AnswerAnswer: A Explanation: The netstat -an command is used to display all active connections and the TCP and...
Which of the information below can be gained through network sniffing? (Select all that apply)
Which of the information below can be gained through network sniffing? (Select all that apply)A . Telnet PasswordsB . Syslog trafficC . DNS trafficD . Programming errorsView AnswerAnswer: A, B, C Explanation: Network sniffing is a technique used to capture and analyze packets traveling across a network. Through network sniffing,...
What will be your first reaction as a first responder?
You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network. What will be your first reaction as a first responder?A . Avoid Fear, Uncertainty and DoubtB...
How will you prioritize these two incidents?
Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is...
How will you prioritize these two incidents?
Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is...
What type of backup is Kelly using?
Kelly is taking backups of the organization's data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using?A . Full backupB . Incremental backupC . Differential BackupD . Normal BackupView AnswerAnswer: B Explanation: An incremental...
How will you prioritize these two incidents?
Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is...
Which of the following network monitoring techniques requires extra monitoring software or hardware?
Which of the following network monitoring techniques requires extra monitoring software or hardware?A . Non-router basedB . Switch basedC . Hub basedD . Router basedView AnswerAnswer: B Explanation: Switch-based network monitoring requires additional monitoring software or hardware because switches operate at the data link layer of the OSI model and...
A company has the right to monitor the activities of their employees on different information systems according to the _______policy.
A company has the right to monitor the activities of their employees on different information systems according to the _______policy.A . Information systemB . User access controlC . Internet usageD . Confidential dataView AnswerAnswer: B Explanation: The right of a company to monitor the activities of their employees on its...
How will you prioritize these two incidents?
Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is...