Which of the following commands will you use with the tcpdump command to display the contents of the packets?
A. tcpdump -q
B. tcpdump -v
C. tcpdump -n
D. tcpdump A
You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.
You have physically installed sensors at all key positions throughout the network such that they all report to the command console.
What will be the key functions of the sensors in such a physical layout? Each correct answer represents a complete solution. Choose all that apply.
A. To collect data from operating system logs
B. To notify the console with an alert if any intrusion is detected
C. To analyze for known signatures
D. To collect data from Web servers
Which of the following firewalls keeps track of the state of network connections traveling across the network?
A. Stateful firewall
B. Application-level firewall
C. Packet filtering firewall
D. Circuit-level firewall
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
A. Active IDS
B. Signature-based IDS
C. Passive IDS
D. Network-based IDS
What are the advantages of an application layer firewall? Each correct answer represents a complete solution. Choose all that apply.
A. It provides detailed logging information for management purposes.
B. It prevents most of the spoofing and DoS attacks.
C. It monitors and filters data.
D. It provides authentication to a device.
Which of the following are well-known ports?
Each correct answer represents a complete solution. Choose two.
A. 443
B. 21
C. 1024
D. 8080
Which of the following determines which protocols can be used by clients to access the Internet in an ISA Server enabled network?
A. SMTP filter
B. POP intrusion detection filter
C. Site and content rule
D. Protocol rule
Which of the following commands used in Linux to create bit-stream images?
A. ss
B. xcopy
C. dd
D. img
Which of the following Windows Registry key contains the password file of the user?
A. HKEY_USER
B. HKEY_DYN_DATA
C. HKEY_LOCAL_MACHINE
D. HKEY_CURRENT_CONFIG
In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?
A. Illicit zone transfer attack
B. DNS poisoning attack
C. Illicit poisoning attack
D. DNS transfer attack