Selected Answer b fingerprinting Answers a port knocking b fingerprinting c

Selected answer b fingerprinting answers a port

This preview shows page 3 - 4 out of 4 pages.

offered by the host systems is known as __________. Selected Answer: b. fingerprinting Answers: a. port knocking b. fingerprinting c. doorknob rattling d. footprinting Question 11 1 out of 1 points Which of the following ports is commonly used for the HTTP protocol? Selected Answer: d. 80 Answers: a. 20 b. 25 c. 53 d. 80 Question 12 1 out of 1 points A padded cell is a hardened honeynet . _________________________ Selected Answer: Fals e Answers: True Fals e Question 13
Image of page 3
0 out of 1 points The primary advantages of a a centralized IDPS control strategy are cost and ease-of-use . _________________________ Selected Answer: Tru e Answers: True Fals e Question 14 0 out of 1 points A(n) event is an indication that a system has just been attacked or is under attack. _________________________ Selected Answer: Tru e Answers: True Fals e Question 15 1 out of 1 points A HIDPS can monitor systems logs for predefined events. Selected Answer: Tru e Answers: Tru e False Question 16 1 out of 1 points Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing. Selected Answer: Fals e Answers: True Fals e
Image of page 4

You've reached the end of your free preview.

Want to read all 4 pages?

  • Fall '20
  • Simple Network Management Protocol, IDPs, Security Fund

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture