Which of the following utilities was he MOST likely usi…
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server.
After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence
again. Which of the following utilities was he MOST likely using to view this issue?
Which of the following types of technologies will BEST …
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate
network. He has tasked the security engineers to implement a technology that is capable of alerting the team
when unusual traffic is on the network. Which of the following types of technologies will BEST address this
scenario?
Which of the following types of IDS has been deployed?
The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has
concerns that the device is only able to detect known anomalies. Which of the following types of IDS has been
deployed?
Which of the following is the type of vulnerability des…
When performing the daily review of the system vulnerability scans of the network Joe, the administrator,
noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe
researches the assigned vulnerability identification number from the vendor website. Joe proceeds with
applying the recommended solution for identified vulnerability.
Which of the following is the type of vulnerability described?
which account is responsible for setting the security p…
In intrusion detection system vernacular, which account is responsible for setting the security policy for an
organization?
Which of the following is being described here?
An administrator is looking to implement a security device which will be able not only to detect network
intrusions at the organization level, but also help to defend against them.
Which of the following is being described here?
Which of the following is designed to stop an intrusion…
Pete, a security administrator, has observed repeated attempts to break into the network. Which of the
following is designed to stop an intrusion on the network?
Which of the following should be deployed to prevent th…
Which of the following should be deployed to prevent the transmission of malicious traffic between virtual
machines hosted on a singular physical device on a network?
Which of the following would be BEST suited for this task?
Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales
websites. Which of the following would be BEST suited for this task?
Which of the following would BEST address this?
Pete, the system administrator, wishes to monitor and limit users’ access to external websites.
Which of the following would BEST address this?