Which action could be used to determine if a host is compromised and flooding traffic onto the network?

IT Questions BankCategory: IT EssentialsWhich action could be used to determine if a host is compromised and flooding traffic onto the network?

Which action could be used to determine if a host is compromised and flooding traffic onto the network?

  • Unseat and then reconnect the hard drive connectors on the host.
  • Disconnect the host from the network.
  • Examine the Device Manager on the host for device conflicts.
  • Check the host hard drive for errors and file system issues.

Explanation: If a network is experiencing an extremely high volume of traffic, disconnecting a host from the network may confirm that the host is compromised and is flooding traffic onto the network. The other issues are hardware issues, and not typically security-related.

Exam with this question: IT Essentials v7.01 Chapter 13 Quiz Answers
Exam with this question: IT Essentials 8 Module 13 Quiz Answers: Security

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments