DCOM 258 Final Exam Review | 140 Questions with 100% Correct Answers | Verified | Latest Update 2024
Which of the following techniques enables an already secure organization to assess security vulnerabilities in real time? - Continuous monitoring Which of the following can determine which flags are set in a TCP/IP handshake? - Protocol analyzer Which of following is the most basic form of IDS? - Signature-based You suspect a broadcast storm on the LAN. Which tool is required to diagnose which network adapter is causing the storm? - Protocol analyzer Which of the following log files should show attempts at unauthorized access? - Security Jason is a security administrator for a company of 4000 users. He wants to store 6 months of security logs to a logging server for analysis. The reports are required by upper management due to legal obligations but are not time-critical. When planning for the requirements of the logging server, which of the following should not be implemented? - Performance baseline and audit trails
Written for
- Institution
- DCOM 258
- Course
- DCOM 258
Document information
- Uploaded on
- January 10, 2024
- Number of pages
- 15
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
dcom 258 final exam review 140 questions with 10