Deck 2: Analyzing Network Reconnaissance

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not a common use of packet analysis?

A) Troubleshooting network connectivity
B) Detecting ping sessions
C) Examining Application Layer sessions
D) Solving DHCP issues
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Capturing and examining data snapshots of network traffic, either in real time or as historical data, is known as _____________ data analysis.
سؤال
The terms "information security" and "network security" are virtually synonymous.
سؤال
Which of the following is a type of wireless attack? (Choose all that apply.)

A) Rogue access point
B) Evil twin
C) Intercepting wireless data
D) Wireless DoS attack
سؤال
What was the first packet capture tool?
سؤال
What are the three major parts of the Wireshark user interface? (Choose all that apply.)

A) Packet Bytes pane
B) Packet List pane
C) Packet Details pane
D) Packet Histogram view
سؤال
What data correlation technique attempts to answer the question, "Will this do something harmful if it is allowed to execute?"
سؤال
Which of the following network reconnaissance tools consolidates real-time monitoring and management of security information with analysis and reporting of security events?

A) IDS
B) SIEM
C) packet analyzer
D) NetFlow analyzer
سؤال
Which of the following is not an element of a syslog message?

A) PRI
B) HEADER
C) ACKNOWL
D) MSG
سؤال
A(n) ____________ is a record of any action that occurs on a computer.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Analyzing Network Reconnaissance
1
Which of the following is not a common use of packet analysis?

A) Troubleshooting network connectivity
B) Detecting ping sessions
C) Examining Application Layer sessions
D) Solving DHCP issues
Detecting ping sessions
2
Capturing and examining data snapshots of network traffic, either in real time or as historical data, is known as _____________ data analysis.
point-in-time
3
The terms "information security" and "network security" are virtually synonymous.
False
4
Which of the following is a type of wireless attack? (Choose all that apply.)

A) Rogue access point
B) Evil twin
C) Intercepting wireless data
D) Wireless DoS attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
What was the first packet capture tool?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
What are the three major parts of the Wireshark user interface? (Choose all that apply.)

A) Packet Bytes pane
B) Packet List pane
C) Packet Details pane
D) Packet Histogram view
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
What data correlation technique attempts to answer the question, "Will this do something harmful if it is allowed to execute?"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following network reconnaissance tools consolidates real-time monitoring and management of security information with analysis and reporting of security events?

A) IDS
B) SIEM
C) packet analyzer
D) NetFlow analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not an element of a syslog message?

A) PRI
B) HEADER
C) ACKNOWL
D) MSG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n) ____________ is a record of any action that occurs on a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.