Question 1 of 25
4.0 Points
Sniffing can be used to ___________.
A. troubleshoot connections
B. investigate malware
C. detect abnormal behavior
D. All of the above
Question 2 of 25
4.0 Points
PSK mode is ___________.
A. a pre-salted key
B. a pre-shared key
, C. more secure
D. enterprise ready
Question 3 of 25
4.0 Points
The characteristics of Ethernet include all but which one of the following?
A. Collision detection
B. Sends traffic to all nodes on a hub
C. CSMA/CD
D. Sends traffic using a token
Question 4 of 25
4.0 Points
Checking DNS for words like “test” or “solaris” is an example of a technique for which of the following
activities?
,
A. Identify potential targets.
B. Remove unwanted listings.
C. Make sure you found the right company.
D. Check the zone file.
Question 5 of 25
4.0 Points
Deploying an IDS into an environment for which it is not designed can fail for which of the following
reasons?
A. Warnings may be incorrect
B. Warnings may be irrelevant