Category: Network Defense

11.3.2 Evaluating Alerts Quiz Answers

Network Defense Module 11.3.2 Evaluating Alerts Quiz Questions Exam Answers 1. What is the host-based intrusion detection tool that is integrated into Security Onion? Sguil Wireshark Snort OSSEC 2. Which tool is included with Security Onion that is used by Snort to automatically download new rules? ELK Sguil …

10.4.2 Network Security Data Quiz Answers

Network Defense Module 10.4.2 Network Security Data Quiz Questions Exam Answers 1. What is a feature of the tcpdump tool? It records metadata about packet flows. It provides real-time reporting and long-term analysis of security events. It uses agents to submit host logs to centralized management servers. It …

9.3.2 Technologies and Protocols Quiz Answers

Network Defense Module 9.3.2 Technologies and Protocols Quiz Questions Exam Answers 1. How do cybercriminals make use of a malicious iFrame? The iFrame allows the browser to load a web page from another source. The attacker embeds malicious content in business appropriate files. The attacker redirects traffic to …

8.8.2 Module 8: Public Key Cryptography Quiz Answers

Network Defense Module 8.8.2 Module 8: Public Key Cryptography Quiz Questions Exam Answers 1. What is the purpose of the DH algorithm? to provide nonrepudiation support to support email data confidentiality to encrypt data traffic after a VPN is established to generate a shared secret between two hosts …

7.7.2 Cloud Security Quiz Answers

Network Defense Module 7.7.2 Cloud Security Quiz Questions Exam Answers 1. What are the two classes of encryption algorithms? (Choose two.) open symmetric asymmetric classic advanced 2. What term is used to describe the phenomenon of more VMs than can be managed effectively? VM Scaling VM Exhaustion VM …

6.4.2 Zone-Based Firewalls Quiz Answers

Network Defense Module 6.4.2 Zone-Based Firewalls Quiz Questions Exam Answers 1. Which statement describes a feature of a zone-based policy firewall? It does not depend on ACLs. All traffic through a given interface is subject to the same inspection. It uses a flat, non-hierarchical data structure making it …

5.3.2 Firewall Technologies Quiz Answers

Network Defense Module 5.3.2 Firewall Technologies Quiz Questions Exam Answers 1. Which statement is a characteristic of a packet filtering firewall? They are susceptible to IP spoofing. They examine each packet in the context of the state of a connection. They have a high impact on network performance. …

4.8.2 Access Control Lists Quiz Answers

Network Defense Module 4.8.2 Access Control Lists Quiz Questions Exam Answers 1. In applying an ACL to a router interface, which traffic is designated as outbound? traffic that is leaving the router and going toward the destination host traffic that is coming from the source IP address into …

3.5.2 Module 3 – Access Control Quiz Answers

Network Defense Module 3.5.2 Module 3 – Access Control Quiz Questions Exam Answers 1. Which three processes are examples of logical access controls? (Choose three.) swipe cards to allow access to a restricted area fences to protect the perimeter of a building guards to monitor security screens biometrics …