Which attack exploits incorrect boundary checking in network software?
Which attack exploits incorrect boundary checking in network software?A . SlowlorisB . buffer overflowC . man-in-the-middleD . SmurfView AnswerAnswer: B
Which event is likely to be a false positive?
Which event is likely to be a false positive?A . Internet Relay Chat signature with an alert context buffer containing #IPS_ROCS YayB . a signature addressing an ActiveX vulnerability alert on a Microsoft developer network documentation pageC . an alert for a long HTTP request with an alert context buffer...
Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?
Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?A . SSHB . SNMPC . TelnetD . NetFlowView AnswerAnswer: B
Which describes the best method for preserving the chain of evidence?
Which describes the best method for preserving the chain of evidence?A . Shut down the machine that is infected, remove the hard drive, and contact the local authorities.B . Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.C . Identify the...
Which describes the best method for preserving the chain of evidence?
Which describes the best method for preserving the chain of evidence?A . Shut down the machine that is infected, remove the hard drive, and contact the local authorities.B . Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.C . Identify the...
Which DNS Query Types pertains to email?
Refer to the exhibit. Which DNS Query Types pertains to email?A . A?B . NS?C . SOA?D . PTR?E . MX?F . TXT?View AnswerAnswer: E
Which two types of data are relevant to investigating network security issues? (Choose two.)
Which two types of data are relevant to investigating network security issues? (Choose two.)A . NetFlowB . device model numbersC . syslogD . routing tablesE . private IP addressesView AnswerAnswer: A,C
Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?
Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?A . SSHB . SNMPC . TelnetD . NetFlowView AnswerAnswer: B
In the context of a network security device like an IPS, which event would qualify as having the highest severity?
In the context of a network security device like an IPS, which event would qualify as having the highest severity?A . remote code execution attemptB . brute force login attemptC . denial of service attackD . instant messenger activityView AnswerAnswer: A
Where should you report suspected security vulnerability in Cisco router software?
Where should you report suspected security vulnerability in Cisco router software?A . Cisco TACB . Cisco IOS EngineeringC . Cisco PSIRTD . Cisco SIOView AnswerAnswer: C