What IDS feature must George implement to meet this requirement?
George is a senior security analyst working for a state agency in Florida. His state’s congress just
passed a bill mandating every state agency to undergo a security audit annually. After learning
what will be required, George needs to implement an IDS as soon as possible before the first audit
occurs. The state bill requires that an IDS with a “time-based induction machine” be used. What
IDS feature must George implement to meet this requirement?
which layer of the OSI model?
Software firewalls work at which layer of the OSI model?
The objective of this act was to protect consumers personal financial information held by financial institutio
The objective of this act was to protect consumers personal financial information held by financial
institutions and their service providers.
What does ICMP Type 3/Code 13 mean?
What does ICMP Type 3/Code 13 mean?
Why did this ping sweep only produce a few responses?
After passively scanning the network of Department of Defense (DoD), you switch over to active
scanning to identify live hosts on their network. DoD is a lage organization and should respond to
any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast
address. Only five hosts responds to your ICMP pings; definitely not the number of hosts you were
expecting. Why did this ping sweep only produce a few responses?
What could have prevented this information from being stolen from the laptops?
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On
these laptops contained sensitive corporate information regarding patents and company
strategies. A month after the laptops were stolen, a competing company was found to have just
developed products that almost exactly duplicated products that Meyer produces. What could
have prevented this information from being stolen from the laptops?
How many possible sequence number combinations are there in TCP/IP protocol?
How many possible sequence number combinations are there in TCP/IP protocol?
What filter should George use in Ethereal?
George is the network administrator of a large Internet company on the west coast. Per corporate
policy, none of the employees in the company are allowed to use FTP or SFTP programs without
obtaining approval from the IT department. Few managers are using SFTP program on their
computers. Before talking to his boss, George wants to have some proof of their activity.
George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his
network. What filter should George use in Ethereal?
which layer of the OSI model?
Software firewalls work at which layer of the OSI model?
What principal of social engineering did Julia use?
Julia is a senior security analyst for Berber Consulting group. She is currently working on a
contract for a small accounting firm in Florida. They have given her permission to perform social
engineering attacks on the company to see if their in-house training did any good. Julia calls the
main number for the accounting firm and talks to the receptionist. Julia says that she is an IT
technician from the company’s main office in Iowa. She states that she needs the receptionist’s
network username and password to troubleshoot a problem they are having. Julia says that Bill
Hammond, the CEO of the company, requested this information. After hearing the name of the
CEO, the receptionist gave Julia all the information she asked for.
What principal of social engineering did Julia use?