IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Security 1.0What type of attack occurs when a threat actor sends packets with false MAC or IP addresses?ITExamAnswers asked 2 years ago • Network Security 1.0Which Snort IPS interface statement is true?ITExamAnswers asked 2 years ago • Network Security 1.0Which type of file contains a compressed, installable version of the Snort IPS virtual machine?ITExamAnswers asked 2 years ago • Network Security 1.0Which two options are components of Snort IPS that is running on an ISR 4000? (Choose two.)ITExamAnswers asked 2 years ago • Network Security 1.0What are the three actions supported by Snort IDS? (Choose three.)ITExamAnswers asked 2 years ago • Network Security 1.0Which action makes the IPS device send TCP resets to hijack and terminate a TCP flow?ITExamAnswers asked 2 years ago • Network Security 1.0Which action terminates a malicious packet only?ITExamAnswers asked 2 years ago • Network Security 1.0Which action logs the IP address from a malicious source only and sends an alert?ITExamAnswers asked 2 years ago • Network Security 1.0In which operating mode does Snort IDS inspect traffic and report alerts, but does not take any action to prevent attacks?ITExamAnswers asked 2 years ago • Network Security 1.0Where does the Snort engine run?ITExamAnswers asked 2 years ago • Network Security 1.0Snort IPS is available on which router platform?ITExamAnswers asked 2 years ago • Network Security 1.0What is an example of a HIPS?ITExamAnswers asked 2 years ago • Network Security 1.0What is true of a HIPS?ITExamAnswers asked 2 years ago • Network Security 1.0What is true of a NIPS that is running in inline mode?ITExamAnswers asked 2 years ago • Network Security 1.0True or False? A HIPS can be configured in either promiscuous or inline mode.ITExamAnswers asked 2 years ago • Network Security 1.0