<< Prev Question Next Question >>

Question 101/183

Which of the following examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (183q)
Question 1: Which of the following is a free security-auditing tool for ...
Question 2: Which of the following IP class addresses are not allotted t...
Question 3: Which of the following is a type of computer security that d...
Question 4: Which of the following represents a network that connects tw...
Question 5: Which of the following is used in conjunction with smoke det...
Question 6: Which of the following is a process that detects a problem, ...
Question 7: Which of the following is one of the most commonly used impl...
Question 8: John works as an Ethical Hacker for www.company.com Inc. He ...
Question 9: FILL BLANK Fill in the blank with the appropriate term. ____...
Question 10: What command is used to terminate certain processes in an Ub...
Question 11: Which of the following systems is formed by a group of honey...
Question 12: John works as a C programmer. He develops the following C pr...
Question 13: Which of the following steps will NOT make a server fault to...
Question 14: Which of the following routing metrics refers to the length ...
Question 15: Which of the following protocols supports source-specific mu...
Question 16: Which of the following statements are true about volatile me...
Question 17: Which of the following attacks combines dictionary and brute...
Question 18: Which of the following attacks combines dictionary and brute...
Question 19: FILL BLANK Fill in the blank with the appropriate term. ____...
Question 20: Paul is a network security technician working on a contract ...
Question 21: Which of the following is a network point that acts as an en...
Question 22: Identify the virtualization level that creates a massive poo...
Question 23: Which of the following is a protocol that describes an appro...
Question 24: Which of the following ranges of addresses can be used in th...
Question 25: Brendan wants to implement a hardware based RAID system in h...
Question 26: Which of the following is NOT a WEP authentication method?...
Question 27: Jason works as a System Administrator for www.company.com In...
Question 28: Which of the following attacks, the attacker cannot use the ...
Question 29: David is working in a mid-sized IT company. Management asks ...
Question 30: Which of the following wireless networks provides connectivi...
Question 31: Which of the following tools scans the network systems for w...
Question 32: You are a professional Computer Hacking forensic investigato...
Question 33: Which of the following is designed to detect the unwanted pr...
Question 34: Which of the following router configuration modes changes te...
Question 35: Which of the following organizations is responsible for mana...
Question 36: Which of the following tools is an open source network intru...
Question 37: Which of the following devices allows wireless communication...
Question 38: Which of the following fields in the IPv6 header replaces th...
Question 39: Fargo, head of network defense at Globadyne Tech, has discov...
Question 40: Which of the following plans is documented and organized for...
Question 41: Which of the following is a maintenance protocol that permit...
Question 42: Which of the following are provided by digital signatures?...
Question 43: Alice wants to prove her identity to Bob. Bob requests her p...
Question 44: Which of the following is a type of VPN that involves a sing...
Question 45: Which of the following protocols is a more secure version of...
Question 46: Which of the following IEEE standards adds QoS features and ...
Question 47: Assume that you are working as a network administrator in th...
Question 48: Which of the following commands is used for port scanning?...
Question 49: FILL BLANK Fill in the blank with the appropriate term. A __...
Question 50: CORRECT TEXT Fill in the blank with the appropriate term. __...
Question 51: George was conducting a recovery drill test as a part of his...
Question 52: Which of the following steps of the OPSEC process examines e...
1 commentQuestion 53: Which of the following things need to be identified during a...
Question 54: A newly joined network administrator wants to assess the org...
Question 55: Which of the following OSI layers formats and encrypts data ...
Question 56: Which of the following is a high-speed network that connects...
Question 57: Which of the following is also known as slag code?...
Question 58: Which of the following defines the extent to which an interr...
Question 59: Which of the following IEEE standards is an example of a DQD...
Question 60: Which of the following is the practice of sending unwanted e...
Question 61: Which of the following helps prevent executing untrusted or ...
Question 62: You work as the network administrator for uCertify Inc. The ...
Question 63: Which of the following represents a network that connects tw...
Question 64: Which of the following types of RAID is also known as disk s...
Question 65: Which of the following protocols permits users to enter a us...
Question 66: Justine has been tasked by her supervisor to ensure that the...
Question 67: Which of the following protocols is a method for implementin...
Question 68: Which of the following help in estimating and totaling up th...
Question 69: Which of the following honeypots is a useful little burglar ...
Question 70: Which of the following techniques is also called access poin...
Question 71: Which of the following is an IPSec protocol that can be used...
Question 72: In which of the following attacks does an attacker use softw...
Question 73: Daniel is monitoring network traffic with the help of a netw...
Question 74: Which of the following is a malicious program that looks lik...
Question 75: Which of the following OSI layers defines the electrical and...
Question 76: James is working as a Network Administrator in a reputed com...
Question 77: Which of the following is a symmetric 64-bit block cipher th...
Question 78: Which of the following protocols uses a control channel over...
Question 79: Which of the following tools is a free laptop tracker that h...
Question 80: Which of the following are provided by digital signatures?...
Question 81: Which of the following protocols is a more secure version of...
Question 82: Which of the following OSI layers defines the electrical and...
Question 83: This is a Windows-based tool that is used for the detection ...
Question 84: An employee of a medical service company clicked a malicious...
Question 85: Which of the following is a communication protocol that mult...
Question 86: Tom works as a network administrator in a multinational orga...
Question 87: DRAG DROP Drag and drop the terms to match with their descri...
Question 88: Which of the following key features is used by TCP in order ...
Question 89: Which of the following ranges of addresses can be used in th...
Question 90: Which of the following protocols is used for exchanging rout...
Question 91: Which of the following is a worldwide organization whose mis...
Question 92: Which of the following is a software tool used in passive at...
Question 93: Which of the following features is used to generate spam on ...
Question 94: Which of the following acts as a verifier for the certificat...
Question 95: Adam works as a Professional Penetration Tester. A project h...
Question 96: Which VPN QoS model guarantees the traffic from one customer...
Question 97: Identify the password cracking attempt involving precomputed...
Question 98: Which of the following protocols is used to report an error ...
Question 99: Which of the following layers refers to the higher-level pro...
Question 100: Which of the following standards is a change in the original...
Question 101: Which of the following examines network traffic to identify ...
Question 102: Which of the following types of RAID is also known as disk s...
Question 103: Which of the following encryption techniques do digital sign...
Question 104: Which of the following plans are documented and organized em...
Question 105: Alex is administering the firewall in the organization's net...
Question 106: You work as a professional Computer Hacking Forensic Investi...
Question 107: CORRECT TEXT Fill in the blank with the appropriate term. __...
Question 108: Which of the following systems monitors the operating system...
Question 109: John is a senior network security administrator working at a...
Question 110: Which has the following fields IPv6 header is reduced by 1 f...
Question 111: The IP addresses reserved for multicasting belong to which o...
Question 112: John works as a professional Ethical Hacker. He has been ass...
Question 113: Which of the following layers of the OSI model provides inte...
Question 114: Which of the following techniques is also called access poin...
Question 115: Which of the following ranges of addresses can be used in th...
Question 116: Which of the following examines network traffic to identify ...
Question 117: A company wants to implement a data backup method which allo...
Question 118: Which of the following policy to add additional information ...
Question 119: ------------is a group of broadband wireless communications ...
Question 120: John has implemented________in the network to restrict the l...
Question 121: Which of the following is an intrusion detection system that...
Question 122: Which of the following statements are TRUE about Demilitariz...
Question 123: Which of the following fields in the IPv6 header is decremen...
Question 124: Will is working as a Network Administrator. Management wants...
Question 125: Which of the following IEEE standards defines the demand pri...
Question 126: Frank is a network technician working for a medium-sized law...
Question 127: What is the response of an Xmas scan if a port is either ope...
Question 128: Identify the minimum number of drives required to setup RAID...
Question 129: Which of the following honeypots provides an attacker access...
Question 130: Which of the following representatives of the incident respo...
Question 131: Which of the following flag to set whether the scan sends TC...
Question 132: A local bank wants to protect their card holder dat a. The b...
Question 133: Which of the following processes helps the business units to...
Question 134: Which of the following is a malicious program that looks lik...
Question 135: With which of the following flag sets does the Xmas tree sca...
Question 136: You want to increase your network security implementing a te...
Question 137: FILL BLANK Fill in the blank with the appropriate term. A __...
Question 138: John has successfully remediated the vulnerability of an int...
Question 139: Network security is the specialist area, which consists of t...
Question 140: A company wants to implement a data backup method that allow...
Question 141: Which of the following helps in blocking all unauthorized in...
Question 142: CORRECT TEXT Fill in the blanks with the appropriate terms. ...
Question 143: Which of the following tools is a free portable tracker that...
Question 144: Which of the following is the full form of SAINT?...
Question 145: Which of the following statements are TRUE about Demilitariz...
Question 146: Bryson is the IT manager and sole IT employee working for a ...
Question 147: Which of the following protocols is used to share informatio...
Question 148: Which of the following is a network analysis tool that sends...
Question 149: Which of the following is a computer network protocol used b...
Question 150: Which type of wireless network attack is characterized by an...
Question 151: Which of the following statements are NOT true about the FAT...
Question 152: Which of the following key features limits the rate a sender...
Question 153: Which of the following analyzes network traffic to trace spe...
Question 154: Which of the following cables is made of glass or plastic an...
Question 155: Which of the following attacks is a class of brute force att...
Question 156: FILL BLANK Fill in the blank with the appropriate term. ____...
Question 157: Which of the following is the process of managing incidents ...
Question 158: Which of the following layers performs routing of IP datagra...
Question 159: Which of the following protocols is used by the Remote Authe...
Question 160: Which of the following IP class addresses are not allotted t...
Question 161: Which of the following modems offers wireless communication ...
Question 162: Which of the following protocols is used for E-mail?...
Question 163: Identify the correct statements regarding a DMZ zone:...
Question 164: Harry has sued the company claiming they made his personal i...
Question 165: You work as a professional Computer Hacking Forensic Investi...
Question 166: Which of the following is a type of scam that entices a user...
Question 167: Assume that you are a network administrator and the company ...
Question 168: Which of the following is a computer networking protocol use...
Question 169: Which of the following types of cyberstalking damages the re...
Question 170: Which of the following is a standard-based protocol that pro...
Question 171: Which of the following is a technique for gathering informat...
Question 172: What is the range for private ports?...
Question 173: Which of the following statements are TRUE about Demilitariz...
Question 174: FILL BLANK Fill in the blank with the appropriate term. A __...
Question 175: Which of the following transmission modes of communication i...
Question 176: Which of the following types of transmission is the process ...
Question 177: Which of the following techniques is used for drawing symbol...
Question 178: Which of the following is a technique for gathering informat...
Question 179: Which of the following is a non-profit organization that ove...
Question 180: Which of the following is a network interconnectivity device...
Question 181: Which of the following types of cyberstalking damages the re...
Question 182: Jason works as a System Administrator for www.company.com In...
Question 183: Which of the following attacks comes under the category of a...