Which of the following is not a method used by passive sensors to monitor traffic?

Question 14Which of the following is not a method used by passive sensors whenmonitoring a network?Spanning portNetwork tapIDPS Load BalancerEvent Viewer logs

5 / 5 ptsQuestion 15Select the answer below that, when using stateful protocol analysis, canidentify common application layer protocols using non-standard ports.

Get answer to your question and much more

10/11/2019Week 4 Quiz: Web and Data SecurityIP packet reassemblyProtocol state tracking5 / 5 ptsQuestion 16____________________ gives administrators the ability to determine thesource or responsible party for an attack or intrusion.

Get answer to your question and much more

5 / 5 ptsQuestion 17True or False: Customized IDPS rules lack the ability to focus on or act upontraffic based on transport layer information.

Get answer to your question and much more

5 / 5 ptsQuestion 18__________ is the process of raising the severity level or importance of anevent.Escalation

10/11/2019Week 4 Quiz: Web and Data Security5 / 5 ptsQuestion 19What is a potential drawback of using a Hybrid IDPS?

Get answer to your question and much more

8/8Quiz Score:90out of 100

5 / 5 ptsQuestion 20Which of the following is not a typical response action taken by an IDPSwhen it detects an issue?

Get answer to your question and much more

End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Cryptography, Wi Fi, Wireless network

Which of the following is NOT a method used by passive sensors to monitor traffic?

Get answer to your question and much more

Which of the following is NOT a network defense function found in intrusion detection and prevention systems?

Get answer to your question and much more

Which of the following is NOT a primary detection methodology?

Get answer to your question and much more

Which of the following is NOT a typical IDPS component?

Get answer to your question and much more

A weakness of a signature-based system is that it must keep state information on a possible attack.

Get answer to your question and much more

Ch 9What is considered the 'cleanup rule' on a Cisco router?

Get answer to your question and much more

What service uses UDP port 53?DNSWhat should a company concerned about protecting its data warehouses and employee privacy might consider installingon the network perimeter to prevent direct connections between the internal network and the Internet?

Get answer to your question and much more

What type of attack are stateless packet filters particularly vulnerable to?

Get answer to your question and much more

What type of ICMP packet can an attacker use to send traffic to a computer they control outside the protected network?

Get answer to your question and much more

Which element of a rule base conceals internal names and IP addresses from users outside the network?

Get answer to your question and much more

Which of the following is a general practice for a rule base?

Get answer to your question and much more

Which of the following is a method for supporting IPv6 on IPv4 networks until IPv6 is universally adopted?

Get answer to your question and much more

Which of the following is an advantage of hardware firewalls?

Get answer to your question and much more

Which of the following is a typical drawback of a free firewall program?

Get answer to your question and much more

Which of the following is described as the combination of an IP address and a port number?

Get answer to your question and much more

Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to blockpackets.

Get answer to your question and much more

Which of the following is NOT among the common guidelines that should be reflected in the rule base to implement anorganization's security policy?

Get answer to your question and much more

Which of the following is NOT an ICMPv6 packet type that you should allow within your organization but never outsidethe organization?

Get answer to your question and much more

Which of the following is NOT a protocol,port pair that should be filtered when an attempt is made to make a connectionfrom outside the company network?

Get answer to your question and much more

End of preview. Want to read all 29 pages?

Upload your study docs or become a

Course Hero member to access this document

Following, IP address, Transmission Control Protocol, Network address translation