SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Science Posted 12 Oct 2017 My Price 10.00

An organization's SIRT members should always be drawn from external and public organizations.

A(n) ____ is software that doesn't just detect packets as they pass through a gateway, but that actively scans the network and sends packets to computers to see whether vulnerabilities exist.

firewall

sniffer

network vulnerability analyzer

intrusion detection system

2.

An organization's SIRT members should always be drawn from external and public organizations.

 True

 False

3.____ involves removing any files or programs that resulted from the intrusion, including malicious code, Registry keys, unnecessary executable files, viruses,worms, or files created by worms.

Eradication

Alerting

Containment

Recovery

 

4The term true positive is sometimes used to describe a genuine attack.

 True

 False

5

A Class C address uses the 255.255.0.0 netmask.

 True

 False

6

If a firewall is used to protect the LAN, sensors can only be positioned behind the firewall.

 True

 False

7

Some sophisticated IDS devices can be set up to take some countermeasures, such as resetting all network connections when an intrusion is detected.

 True

 False

8

____, like firewall hardware appliances, can handle more network traffic and have better scalability than software IDS packages.

Norton Internet Security

Mcafee Personal IDS

IDS hardware appliances

Snort

 

9.In a ____ configuration, the HIDS sends all data that's gathered to a central location (the command console) for analysis.

distributed

centralized

local

remote

10

The first step in the intrusion detection process occurs before the first packet is ever detected on the network.

 True

 False

 

11.

Sensors installed on individual hosts read packets as they pass into and out of network segments.

 True

 False

____ is the process of replaying the attack so that you can see what the attacker viewed.

Counterattack

External attack

Monitored attack

Attack visualization

 

____ tell SIRT members to keep records of who performed each task and remind them to analyze the backup of the affected system while locking away the original media for safekeeping.

  1. Security policies
  2. Acceptable use procedures
  3. Eradication policies
  4. Containment procedures

Answers

(5)
Status NEW Posted 12 Oct 2017 07:10 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)