Which of the following would be BEST suited for this task?
Mike, a network administrator, has been asked to passively monitor network traffic to the
company’s sales websites. Which of the following would be BEST suited for this task?
Which of the following should be deployed to prevent the transmission of malicious traffic between virtual mac
Which of the following should be deployed to prevent the transmission of malicious traffic between
virtual machines hosted on a singular physical device on a network?
Which of the following is designed to stop an intrusion on the network?
Pete, a security administrator, has observed repeated attempts to break into the network. Which of
the following is designed to stop an intrusion on the network?
Which of the following is being described here?
An administrator is looking to implement a security device which will be able to not only detect
network intrusions at the organization level, but help defend against them as well. Which of the
following is being described here?
which account is responsible for setting the security policy for an organization?
In intrusion detection system vernacular, which account is responsible for setting the security
policy for an organization?
Which of the following is the type of vulnerability described?
When performing the daily review of the system vulnerability scans of the network Joe, the
administrator, noticed several security related vulnerabilities with an assigned vulnerability
identification number. Joe researches the assigned vulnerability identification number from the
vendor website. Joe proceeds with applying the recommended solution for identified vulnerability.
Which of the following is the type of vulnerability described?
Which of the following types of IDS has been deployed?
The network security engineer just deployed an IDS on the network, but the Chief Technical
Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the
following types of IDS has been deployed?
Which of the following types of technologies will BEST address this scenario?
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is
capable of alerting the team when unusual traffic is on the network. Which of the following types of
technologies will BEST address this scenario?
Which of the following utilities was he MOST likely using to view this issue?
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server.
After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in
sequence again. Which of the following utilities was he MOST likely using to view this issue?
Which the following flags are used to establish a TCP connection?
Which the following flags are used to establish a TCP connection? (Select TWO).