Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?
Correct Answer:
C
🗳️
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?
Correct Answer:
A
🗳️
What is the motivation behind SYN/FIN scanning?
Correct Answer:
B
🗳️
There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?
Correct Answer:
D
🗳️
Which of the following is a private, RFC 1918 compliant IP address that would be assigned to a DHCP scope on a private LAN?
Correct Answer:
C
🗳️