Evacuation Training Session Events Order
14 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

When performing a DNS lookup of www.google.com from a remote network, which server is likely to provide an Authoritative reply?

  • The top-level DNS server for.com
  • The DNS server for google.com
  • The local DNS server (correct)
  • The root DNS server
  • What is the most appropriate preventative measure for a packet capture file that contains a long series of 'no operation' (NOP) commands and a malicious payload?

  • Restrictions on file permissions
  • Controls against time of check/time of use attacks (correct)
  • Limits on the number of failed logins
  • Boundary checks on program inputs
  • When should the initial database for a Linux file integrity checker be created?

  • Before a system is patched
  • Before a system has been compromised (correct)
  • After a system has been compromised
  • During an attack
  • What is the term used to describe the validation of vulnerabilities in a network environment that are able to be exploited by an attacker?

    <p>Vulnerability scanning</p> Signup and view all the answers

    In Incident Handling, which statements describe the term 'incident'?

    <p>A and B</p> Signup and view all the answers

    Which SIP method is used to setup a new session and add a caller?

    <p>INVITE</p> Signup and view all the answers

    How would the alert for activity generated by a worm, with normal network traffic, be categorized?

    <p>False Positive</p> Signup and view all the answers

    For what aspect of UNIX systems was process accounting originally developed?

    <p>Process tracking</p> Signup and view all the answers

    What do 'In-line NIDS' devices use to identify malicious events on the network?

    <p>Application analysis</p> Signup and view all the answers

    What is the registry key used to manage remote registry share permissions for the whole registry?

    <p>winreg</p> Signup and view all the answers

    Which layer of the TCP/IP Protocol Stack is responsible for port numbers?

    <p>Transport</p> Signup and view all the answers

    What is the primary purpose of in-line NIDS devices in network security?

    <p>To identify and prevent malicious events on the network</p> Signup and view all the answers

    What is the term used to describe the process of validating vulnerabilities in a network environment that are exploitable by an attacker?

    <p>Penetration Testing</p> Signup and view all the answers

    Which layer of the TCP/IP Protocol Stack is responsible for assigning port numbers?

    <p>Transport Layer</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser