Exam 2: Analyzing Network Reconnaissance

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The terms "information security" and "network security" are virtually synonymous.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

Which of the following is not a common use of packet analysis?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

B

A(n) ____________ is a record of any action that occurs on a computer.

Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Verified

event log

Which of the following network reconnaissance tools consolidates real-time monitoring and management of security information with analysis and reporting of security events?

(Multiple Choice)
4.8/5
(42)

What was the first packet capture tool?

(Short Answer)
4.8/5
(31)

What data correlation technique attempts to answer the question, "Will this do something harmful if it is allowed to execute?"

(Short Answer)
4.7/5
(28)

Which of the following is a type of wireless attack? (Choose all that apply.)

(Multiple Choice)
4.9/5
(42)

What are the three major parts of the Wireshark user interface? (Choose all that apply.)

(Multiple Choice)
4.8/5
(38)

Which of the following is not an element of a syslog message?

(Multiple Choice)
4.7/5
(32)

Capturing and examining data snapshots of network traffic, either in real time or as historical data, is known as _____________ data analysis.

(Short Answer)
4.7/5
(34)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)