Podcast
Questions and Answers
When performing a DNS lookup of www.google.com from a remote network, which server is likely to provide an Authoritative reply?
When performing a DNS lookup of www.google.com from a remote network, which server is likely to provide an Authoritative reply?
What is the most appropriate preventative measure for a packet capture file that contains a long series of 'no operation' (NOP) commands and a malicious payload?
What is the most appropriate preventative measure for a packet capture file that contains a long series of 'no operation' (NOP) commands and a malicious payload?
When should the initial database for a Linux file integrity checker be created?
When should the initial database for a Linux file integrity checker be created?
What is the term used to describe the validation of vulnerabilities in a network environment that are able to be exploited by an attacker?
What is the term used to describe the validation of vulnerabilities in a network environment that are able to be exploited by an attacker?
Signup and view all the answers
In Incident Handling, which statements describe the term 'incident'?
In Incident Handling, which statements describe the term 'incident'?
Signup and view all the answers
Which SIP method is used to setup a new session and add a caller?
Which SIP method is used to setup a new session and add a caller?
Signup and view all the answers
How would the alert for activity generated by a worm, with normal network traffic, be categorized?
How would the alert for activity generated by a worm, with normal network traffic, be categorized?
Signup and view all the answers
For what aspect of UNIX systems was process accounting originally developed?
For what aspect of UNIX systems was process accounting originally developed?
Signup and view all the answers
What do 'In-line NIDS' devices use to identify malicious events on the network?
What do 'In-line NIDS' devices use to identify malicious events on the network?
Signup and view all the answers
What is the registry key used to manage remote registry share permissions for the whole registry?
What is the registry key used to manage remote registry share permissions for the whole registry?
Signup and view all the answers
Which layer of the TCP/IP Protocol Stack is responsible for port numbers?
Which layer of the TCP/IP Protocol Stack is responsible for port numbers?
Signup and view all the answers
What is the primary purpose of in-line NIDS devices in network security?
What is the primary purpose of in-line NIDS devices in network security?
Signup and view all the answers
What is the term used to describe the process of validating vulnerabilities in a network environment that are exploitable by an attacker?
What is the term used to describe the process of validating vulnerabilities in a network environment that are exploitable by an attacker?
Signup and view all the answers
Which layer of the TCP/IP Protocol Stack is responsible for assigning port numbers?
Which layer of the TCP/IP Protocol Stack is responsible for assigning port numbers?
Signup and view all the answers