Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
Correct Answer:
C
🗳️
You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.
This type of IDS is called __________.
Correct Answer:
C
🗳️
Which of the following are open-source vulnerability scanners? (Choose three.)
Correct Answer:
ABC
🗳️
Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.
What will you do when you are required to see all traffic of the network?
Correct Answer:
A
🗳️
Which of the following techniques is used to identify attacks originating from a botnet?
Correct Answer:
D
🗳️