Anonymous asked 8/13/2010 Susan will be configuring a snort network IDS sensor to monitor her subnetwork. She will be using a web-based console interface to manage the IDS system, and will need to configure an _____________________ to store the alert data recorded by the snor?
Anonymous asked 8/12/2010 Gary needs a specialized IPS to limit his exposure to SQL injection attacks against his web server exposed to the public network. He should consider purchasing an ____________?
Anonymous asked 8/12/2010 Richard wants to modify his current network IDS solution to allow his sensor to stop unwanted activity, turning it into an IPS. Richard should replace his passive TAP with an ______________ to allow his sensor to terminate unwanted?
Anonymous asked 8/12/2010 Higher headquarters has acquired a software package to centrally collect logging data from numerous servers, switches, firewalls, printers, routers etc. This type of IDS/IPS system is commonly referred to as a __________________ IDS/IPS system?
Anonymous asked 8/11/2010 Which answer best identifies stand-alone software that does not require a user to assist in its propogation?
Anonymous asked 8/8/2010 The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software?
Anonymous asked 8/5/2010 Richard wants to modify his current network IDS solution to allow his sensor to stop unwanted activity, turning it into an IPS. Richard should replace his passive TAP with an ______________ to allow his sensor to terminate unwanted connections?
Anonymous asked 8/3/2010 Which Of The Following Would NOT Be A Possible Vulnerability Or Exploit That May Lead To An Attacker By-passing The Firewall?
Anonymous asked 8/2/2010 Which Two Factors Contribute To The Increased Throughput When All Nodes Of A LAN Are Connected To A Switch Instead Of A Hub?
Anonymous asked 8/1/2010 Refer To The Exhibit. A Network Administrator Configures A Static Route On Router R1 To Reach The 192.168.1.0/24 Network. Which IP Address Should Be Used As The Next-hop Address In The Ip Route Command?
Anonymous asked 8/1/2010 Norman Is Looking Into An IDS/IPS Solution For His Command. The Network Engineers Recommended He Select A Solution That Requires Packets To Pass In And Out Of The Device, And That It Be Connected In Series With The Outbound Traffic Flow. Norman Shoul?
Anonymous asked 7/29/2010 Your Account Has Been Locked . Please Click "Forgot Password " To Start The Unlocking Process. (81003003)?