Which of the following would be BEST suited for this task?
Mike, a network administrator, has been asked to passively monitor network traffic to the company’s
sales websites. Which of the following would be BEST suited for this task?
Which of the following should be deployed to prevent the transmission of malicious traffic between virtual mac
Which of the following should be deployed to prevent the transmission of malicious traffic between
virtual machines hosted on a singular physical device on a network?
Which of the following is designed to stop an intrusion on the network?
Pete, a security administrator, has observed repeated attempts to break into the network. Which of the
following is designed to stop an intrusion on the network?
Which of the following is being described here?
An administrator is looking to implement a security device which will be able to not only detect network
intrusions at the organization level, but help defend against them as well. Which of the following is being
described here?
which account is responsible for setting the security policy for an organization?
In intrusion detection system vernacular, which account is responsible for setting the security policy for
an organization?
Which of the following is the type of vulnerability described?
When performing the daily review of the system vulnerability scans of the network Joe, the administrator,
noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe
researches the assigned vulnerability identification number from the vendor website. Joe proceeds with
applying the recommended solution for identified vulnerability.Which of the following is the type of vulnerability described?
Which of the following types of IDS has been deployed?
has concerns that the device is only able to detect known anomalies. Which of the following types of IDS
has been deployed?
Which of the following types of technologies will BEST address this scenario?
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is capable of
alerting the team when unusual traffic is on the network. Which of the following types of technologies
will BEST address this scenario?
Which of the following utilities was he MOST likely using to view this issue?
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server.
After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in
sequence again. Which of the following utilities was he MOST likely using to view this issue?
Which the following flags are used to establish a TCP connection?
Which the following flags are used to establish a TCP connection? (Select TWO).