You would like to inspect raw packets from the network. What tool could you use? A. SIEM B. packet analyzer C. Netstat D
Posted: Tue Jul 12, 2022 8:16 am
You would like to inspect raw packets from the network. Whattool could you use?
A.
SIEM
B.
packet analyzer
C.
Netstat
D.
MBSA
Which of the following belong to the general phases of Digitalforensics ? [ Select one or more ]
A.
Recovery
B.
Containment
C.
Analysis
D.
Identification
You are performing a vulnerability assessment and attemptingservice discovery. If you send a packet withthe SYN flag set and get no responsefrom the specified port number, what does that tell you?
A.
The target device is behind a firewall.
B.
The device is behind a firewall, and the port is open.
C.
The device is reachable, the port is open, and the service isavailable.
D.
The device is reachable, but the port is closed, and the serviceis not available.
Which vulnerability is an attack in which an unauthorized useraccesses a network and stays there, undetected, for a long periodof time?
A.
APT
B.
Spyware
C.
ransomware
D.
DDoS
Two active attacks have been detected by the IDS today. Yourboss has instructed the team to spend the next hour determining thedata types involved in each attack before the attacks areprioritized for response. The medical records of an individual areconsidered which data type?
A.
intellectual property
B.
payment card information
C.
PII
D.
PHI
A.
SIEM
B.
packet analyzer
C.
Netstat
D.
MBSA
Which of the following belong to the general phases of Digitalforensics ? [ Select one or more ]
A.
Recovery
B.
Containment
C.
Analysis
D.
Identification
You are performing a vulnerability assessment and attemptingservice discovery. If you send a packet withthe SYN flag set and get no responsefrom the specified port number, what does that tell you?
A.
The target device is behind a firewall.
B.
The device is behind a firewall, and the port is open.
C.
The device is reachable, the port is open, and the service isavailable.
D.
The device is reachable, but the port is closed, and the serviceis not available.
Which vulnerability is an attack in which an unauthorized useraccesses a network and stays there, undetected, for a long periodof time?
A.
APT
B.
Spyware
C.
ransomware
D.
DDoS
Two active attacks have been detected by the IDS today. Yourboss has instructed the team to spend the next hour determining thedata types involved in each attack before the attacks areprioritized for response. The medical records of an individual areconsidered which data type?
A.
intellectual property
B.
payment card information
C.
PII
D.
PHI