DCOM 258 FINAL EXAM REVIEW 2024 WITH 100% CORRECT ANSWERS
Which of the following techniques enables an already secure organization to assess security vulnerabilities in real time? - correct answer Continuous monitoring Which of the following can determine which flags are set in a TCP/IP handshake? - correct answer Protocol analyzer Which of following is the most basic form of IDS? - correct answer Signature-based You suspect a broadcast storm on the LAN. Which tool is required to diagnose which network adapter is causing the storm? - correct answer Protocol analyzer Which of the following log files should show attempts at unauthorized access? - correct answer Security Jason is a security administrator for a company of 4000 users. He wants to store 6 months of security logs to a logging server for analysis. The reports are required by upper management due to legal obligations but are not time-critical. When planning for the requirements of the logging server, which of the following should not be implemented? - correct answer Performance baseline and audit trails What kind of security control do computer security audits fall under? - correct answer Detective Which tool can be instrumental in capturing FTP GET requests? - correct answer Protocol analyzer Michael has just completed monitoring and analyzing a web server. Which of the following indicates that the
Escuela, estudio y materia
- Institución
- DCOM 258
- Grado
- DCOM 258
Información del documento
- Subido en
- 29 de febrero de 2024
- Número de páginas
- 15
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
dcom 258 final exam review 2024 with 100 correct