DCOM 258 FINAL EXAM REVIEW 2024 WITH 100% CORRECT ANSWERS
Which of the following techniques enables an already secure organization to assess security vulnerabilities in real time? - correct answer Continuous monitoring Which of the following can determine which flags are set in a TCP/IP handshake? - correct answer Protocol analyzer Which of following is the most basic form of IDS? - correct answer Signature-based You suspect a broadcast storm on the LAN. Which tool is required to diagnose which network adapter is causing the storm? - correct answer Protocol analyzer Which of the following log files should show attempts at unauthorized access? - correct answer Security Jason is a security administrator for a company of 4000 users. He wants to store 6 months of security logs to a logging server for analysis. The reports are required by upper management due to legal obligations but are not time-critical. When planning for the requirements of the logging server, which of the following should not be implemented? - correct answer Performance baseline and audit trails What kind of security control do computer security audits fall under? - correct answer Detective Which tool can be instrumental in capturing FTP GET requests? - correct answer Protocol analyzer Michael has just completed monitoring and analyzing a web server. Which of the following indicates that the
Written for
- Institution
- DCOM 258
- Course
- DCOM 258
Document information
- Uploaded on
- February 29, 2024
- Number of pages
- 15
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
dcom 258 final exam review 2024 with 100 correct