Deck 2: Analyzing Network Reconnaissance
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 2: Analyzing Network Reconnaissance
1
Which of the following is not a common use of packet analysis?
A) Troubleshooting network connectivity
B) Detecting ping sessions
C) Examining Application Layer sessions
D) Solving DHCP issues
A) Troubleshooting network connectivity
B) Detecting ping sessions
C) Examining Application Layer sessions
D) Solving DHCP issues
B
2
Capturing and examining data snapshots of network traffic, either in real time or as historical data, is known as _____________ data analysis.
point-in-time
3
The terms "information security" and "network security" are virtually synonymous.
False
4
Which of the following is a type of wireless attack? (Choose all that apply.)
A) Rogue access point
B) Evil twin
C) Intercepting wireless data
D) Wireless DoS attack
A) Rogue access point
B) Evil twin
C) Intercepting wireless data
D) Wireless DoS attack
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
What was the first packet capture tool?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
What are the three major parts of the Wireshark user interface? (Choose all that apply.)
A) Packet Bytes pane
B) Packet List pane
C) Packet Details pane
D) Packet Histogram view
A) Packet Bytes pane
B) Packet List pane
C) Packet Details pane
D) Packet Histogram view
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
What data correlation technique attempts to answer the question, "Will this do something harmful if it is allowed to execute?"
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following network reconnaissance tools consolidates real-time monitoring and management of security information with analysis and reporting of security events?
A) IDS
B) SIEM
C) packet analyzer
D) NetFlow analyzer
A) IDS
B) SIEM
C) packet analyzer
D) NetFlow analyzer
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not an element of a syslog message?
A) PRI
B) HEADER
C) ACKNOWL
D) MSG
A) PRI
B) HEADER
C) ACKNOWL
D) MSG
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
A(n) ____________ is a record of any action that occurs on a computer.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck