Deck 2: Analyzing Network Reconnaissance

Full screen (f)
exit full mode
Question
Which of the following is not a common use of packet analysis?

A) Troubleshooting network connectivity
B) Detecting ping sessions
C) Examining Application Layer sessions
D) Solving DHCP issues
Use Space or
up arrow
down arrow
to flip the card.
Question
Capturing and examining data snapshots of network traffic, either in real time or as historical data, is known as _____________ data analysis.
Question
The terms "information security" and "network security" are virtually synonymous.
Question
Which of the following is a type of wireless attack? (Choose all that apply.)

A) Rogue access point
B) Evil twin
C) Intercepting wireless data
D) Wireless DoS attack
Question
What was the first packet capture tool?
Question
What are the three major parts of the Wireshark user interface? (Choose all that apply.)

A) Packet Bytes pane
B) Packet List pane
C) Packet Details pane
D) Packet Histogram view
Question
What data correlation technique attempts to answer the question, "Will this do something harmful if it is allowed to execute?"
Question
Which of the following network reconnaissance tools consolidates real-time monitoring and management of security information with analysis and reporting of security events?

A) IDS
B) SIEM
C) packet analyzer
D) NetFlow analyzer
Question
Which of the following is not an element of a syslog message?

A) PRI
B) HEADER
C) ACKNOWL
D) MSG
Question
A(n) ____________ is a record of any action that occurs on a computer.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Analyzing Network Reconnaissance
1
Which of the following is not a common use of packet analysis?

A) Troubleshooting network connectivity
B) Detecting ping sessions
C) Examining Application Layer sessions
D) Solving DHCP issues
B
2
Capturing and examining data snapshots of network traffic, either in real time or as historical data, is known as _____________ data analysis.
point-in-time
3
The terms "information security" and "network security" are virtually synonymous.
False
4
Which of the following is a type of wireless attack? (Choose all that apply.)

A) Rogue access point
B) Evil twin
C) Intercepting wireless data
D) Wireless DoS attack
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
What was the first packet capture tool?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
What are the three major parts of the Wireshark user interface? (Choose all that apply.)

A) Packet Bytes pane
B) Packet List pane
C) Packet Details pane
D) Packet Histogram view
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
What data correlation technique attempts to answer the question, "Will this do something harmful if it is allowed to execute?"
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following network reconnaissance tools consolidates real-time monitoring and management of security information with analysis and reporting of security events?

A) IDS
B) SIEM
C) packet analyzer
D) NetFlow analyzer
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not an element of a syslog message?

A) PRI
B) HEADER
C) ACKNOWL
D) MSG
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
A(n) ____________ is a record of any action that occurs on a computer.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.