When an IDS generates an alert for a correctly detected network attack, what is this event called?
When an IDS generates an alert for a correctly detected network attack, what is this event called?A . false positiveB . true negativeC . true positiveD . false negativeView AnswerAnswer: C
Which protocol is typically considered critical for LAN operation?
Which protocol is typically considered critical for LAN operation?A . BGPB . ARPC . SMTPD . GREView AnswerAnswer: B
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.) A. Completely disconnect the network from the Internet. B. Deploy a stateful edge firewall. C. Buy an insurance policy A. against attack-related business losses. D. Implement a password management...
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.) A. Completely disconnect the network from the Internet. B. Deploy a stateful edge firewall. C. Buy an insurance policy A. against attack-related business losses. D. Implement a password management...
Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)
Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)A . Verify user login credentials.B . Troubleshoot firewall performance.C . Monitor database applications.D . Create security policies on routers.View AnswerAnswer: B,D
Which protocol is used in this network traffic flow?
Refer to the exhibit. Which protocol is used in this network traffic flow?A . SNMPB . SSHC . DNSD . TelnetView AnswerAnswer: B
Which two types of data are relevant to investigating network security issues? (Choose two.)
Which two types of data are relevant to investigating network security issues? (Choose two.)A . NetFlowB . device model numbersC . syslogD . routing tablesE . private IP addressesView AnswerAnswer: A,C
When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)
When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)A . product serial numberB . MAC addressC . IP addressD . product model numberE . broadcast addressView AnswerAnswer: B,C
Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)
Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)A . Verify user login credentials.B . Troubleshoot firewall performance.C . Monitor database applications.D . Create security policies on routers.View AnswerAnswer: B,D
When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)
When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)A . product serial numberB . MAC addressC . IP addressD . product model numberE . broadcast addressView AnswerAnswer: B,C