Which four of the following are the primary parts of the Snort configuration file?
You are configuring a new IDS, running Snort, in your network. To better configure Snort, you are studying the configuration file. Which four of the following are the primary parts of the Snort configuration file?
0/24 network using any port?
You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp traffic from any host other than 172.16.40.50 using any port, to any host in the 10.0.10.0/24 network using any port?
11 authentication packet?
When performing wireless network traffic analysis, what is the type and subtype for an 802.11 authentication packet?
you need to verify that your equipment will not interfere with other wireless equipment frequencies
You have been given the task of building the new wireless networks for your office, and you need to verify that your equipment will not interfere with other wireless equipment frequencies. What wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range?
What does RFC 791 specify the standards for?
You are introducing a co-worker to the security systems in place in your organization. During the discussion you begin talking about the network, and how it is implemented. You mention something in RFC 791, and are asked what that is. What does RFC 791 specify the standards for?
Traffic on what other port must be examined to view any file contents?
You are monitoring the network traffic on your Frame-Relay Internet connection. You notice a large amount of unauthorized traffic on port 21. You examine the packets, and notice there are no files being transferred. Traffic on what other port must be examined to view any file contents?
Which of the following would you use during the creation of your rule?
You are working on your companys IPTables Firewall; you wish to create a rule to address traffic using ports 1024 through 2048. Which of the following would you use during the creation of your rule?
What are the two basic positions you can take when creating the policy?
At a policy meeting you have been given the task of creating the firewall policy. What are the two basic positions you can take when creating the policy?
Which of the following are the two common systems token-based authentication uses?
You are planning on implementing a token-based authentication system in your network. The network currently is spread out over four floors of your building. There are plans to add three branch offices. During your research you are analyzing the different types of systems. Which of the following are the two common systems token-based authentication uses?
What is the meaning of this line?
During your review of the logs of your Cisco router, you see the following line. What is the meaning of this line?
%SYS-5-CONFIG_I: Configured from console by vty1 (172.16.10.1)