Matching
Match each item with a statement below.
Premises:
Composed of information commonly known about the individual
Typically the most time consuming way to crack a password
Uses a list of common passwords to try to crack an unknown password
Examines network traffic for known attack signatures
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Responses:
Snort
Intrusion detection
Dictionary attack
Brute force
Weak password
Correct Answer:
Premises:
Responses:
Composed of information commonly known about the individual
Typically the most time consuming way to crack a password
Uses a list of common passwords to try to crack an unknown password
Examines network traffic for known attack signatures
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Premises:
Composed of information commonly known about the individual
Typically the most time consuming way to crack a password
Uses a list of common passwords to try to crack an unknown password
Examines network traffic for known attack signatures
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Responses:
Related Questions
Q1: In order to inform the users of
Q2: Capturing packets is also referred to as
Q9: A(n)_ examines traffic and notes suspicious behavior
Q11: A _ is an alert given when
Q14: Security policies and procedures should be static.
Q16: One way around the switch-based limitation is
Q19: Describe the educational,diagnostics,network baseline measurements,and security reasons
Q24: A(n)_ describes the steps needed to execute
Q28: How do you prevent booting from a
Q29: Cracking a password can take many different