Evacuation Training Session Events Order

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

When performing a DNS lookup of www.google.com from a remote network, which server is likely to provide an Authoritative reply?

  • The top-level DNS server for.com
  • The DNS server for google.com
  • The local DNS server (correct)
  • The root DNS server

What is the most appropriate preventative measure for a packet capture file that contains a long series of 'no operation' (NOP) commands and a malicious payload?

  • Restrictions on file permissions
  • Controls against time of check/time of use attacks (correct)
  • Limits on the number of failed logins
  • Boundary checks on program inputs

When should the initial database for a Linux file integrity checker be created?

  • Before a system is patched
  • Before a system has been compromised (correct)
  • After a system has been compromised
  • During an attack

What is the term used to describe the validation of vulnerabilities in a network environment that are able to be exploited by an attacker?

<p>Vulnerability scanning (D)</p> Signup and view all the answers

In Incident Handling, which statements describe the term 'incident'?

<p>A and B (A)</p> Signup and view all the answers

Which SIP method is used to setup a new session and add a caller?

<p>INVITE (B)</p> Signup and view all the answers

How would the alert for activity generated by a worm, with normal network traffic, be categorized?

<p>False Positive (D)</p> Signup and view all the answers

For what aspect of UNIX systems was process accounting originally developed?

<p>Process tracking (A)</p> Signup and view all the answers

What do 'In-line NIDS' devices use to identify malicious events on the network?

<p>Application analysis (A)</p> Signup and view all the answers

What is the registry key used to manage remote registry share permissions for the whole registry?

<p>winreg (A)</p> Signup and view all the answers

Which layer of the TCP/IP Protocol Stack is responsible for port numbers?

<p>Transport (D)</p> Signup and view all the answers

What is the primary purpose of in-line NIDS devices in network security?

<p>To identify and prevent malicious events on the network (A)</p> Signup and view all the answers

What is the term used to describe the process of validating vulnerabilities in a network environment that are exploitable by an attacker?

<p>Penetration Testing (B)</p> Signup and view all the answers

Which layer of the TCP/IP Protocol Stack is responsible for assigning port numbers?

<p>Transport Layer (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Use Quizgecko on...
Browser
Browser