What are the two major components of network security that an IDS can meet?
You are configuring the new Intrusion Detection System at your office. Your CEO asks you what
the IDS will do for the organization. You tell the CEO about the three main components of Network
Security and explain how an IDS can be used to meet two of those components. What are the two
major components of network security that an IDS can meet?
Which of the following is used as a set of guidance materials for IT governance?
Which of the following is used as a set of guidance materials for IT governance?
What command will you run to see the CPU percentage per application in real-time?
You fear an unauthorized program has taken control of your CPU in your Linux system. What
command will you run to see the CPU percentage per application in real-time?
Which of the following best describes the process of Host-Based Intrusion Detection Systems?
After a meeting between the IT department leaders and a security consultant, they decide to
implement
a new IDS in your network. You are later asked to explain to your team the type of IDS that is
going to be implemented. Which of the following best describes the process of Host-Based
Intrusion Detection Systems?
What is the objective of IT Service Management?
What is the objective of IT Service Management?
What will be the level of permission given to the user if you assign an Octal value of 7?
You are setting the permissions on a new file in Linux. What will be the level of permission given to
the user if you assign an Octal value of 7?
Which of the following best describes Interval Analysis?
You have successfully implemented a new Intrusion Detection System in your network. You have
verified that the system is active and did detect the tests you have run against it thus far. You are
now in the stage of identifying the type of analysis you wish to use with the system. You meet with
the rest of the IT staff and are asked to describe the different options for analysis. Which of the
following best describes Interval Analysis?
which process shall Problem Management ensure that up-to-date information on Known Errors and corrected Proble
To which process shall Problem Management ensure that up-to-date information on Known Errors
and corrected Problems is available?
What will be the level of permission given to the user if you assign an Octal value of 6?
You are setting the permissions on a new file in Linux. What will be the level of permission given to
the user if you assign an Octal value of 6?
Which of the following Snort rules will log any telnet traffic from any IP address to port 23 of the 10.0.10.0
You are configuring your new IDS machine, where you have recently installed Snort. While you
are working with this machine, you wish to create some basic rules to test the ability to log traffic
as you desire.
Which of the following Snort rules will log any telnet traffic from any IP address to port 23 of the
10.0.10.0/24 network?