11.3.2 Evaluating Alerts Quiz Answers

Network Defense Module 11.3.2 Evaluating Alerts Quiz Questions Exam Answers 1. What is the host-based intrusion detection tool that is integrated into Security Onion? Sguil Wireshark Snort OSSEC 2. Which tool is included with Security Onion that is used by Snort to automatically download new rules? ELK Sguil …

10.4.2 Network Security Data Quiz Answers

Network Defense Module 10.4.2 Network Security Data Quiz Questions Exam Answers 1. What is a feature of the tcpdump tool? It records metadata about packet flows. It provides real-time reporting and long-term analysis of security events. It uses agents to submit host logs to centralized management servers. It …

9.3.2 Technologies and Protocols Quiz Answers

Network Defense Module 9.3.2 Technologies and Protocols Quiz Questions Exam Answers 1. How do cybercriminals make use of a malicious iFrame? The iFrame allows the browser to load a web page from another source. The attacker embeds malicious content in business appropriate files. The attacker redirects traffic to …

8.8.2 Module 8: Public Key Cryptography Quiz Answers

Network Defense Module 8.8.2 Module 8: Public Key Cryptography Quiz Questions Exam Answers 1. What is the purpose of the DH algorithm? to provide nonrepudiation support to support email data confidentiality to encrypt data traffic after a VPN is established to generate a shared secret between two hosts …

7.7.2 Cloud Security Quiz Answers

Network Defense Module 7.7.2 Cloud Security Quiz Questions Exam Answers 1. What are the two classes of encryption algorithms? (Choose two.) open symmetric asymmetric classic advanced 2. What term is used to describe the phenomenon of more VMs than can be managed effectively? VM Scaling VM Exhaustion VM …

6.4.2 Zone-Based Firewalls Quiz Answers

Network Defense Module 6.4.2 Zone-Based Firewalls Quiz Questions Exam Answers 1. Which statement describes a feature of a zone-based policy firewall? It does not depend on ACLs. All traffic through a given interface is subject to the same inspection. It uses a flat, non-hierarchical data structure making it …