Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What feature of Wireshark allows the analysis of one HTTP conversation?

A.

Follow UDP Stream

B.

Follow TCP Stream

C.

Conversation list > IPV4

D.

Setting a display filter to ‘tcp’

Which tool uses a Snort rules file for input and by design triggers Snort alerts?

A.

snot

B.

stick

C.

Nidsbench

D.

ftester

In an 802.1x deployment, which of the following would typically be considered a Supplicant?

A.

A network switch

B.

A perimeter firewall

C.

A RADIUS server

D.

A client laptop

Which Unix administration tool is designed to monitor configuration changes to Cisco, Extreme and Foundry infrastructure devices?

A.

SNMP

B.

Netflow

C.

RANCID

D.

RMON

Which of the following would be used in order to restrict software form performing unauthorized operations, such as invalid access to memory or invalid calls to system access?

A.

Perimeter Control

B.

User Control

C.

Application Control

D.

Protocol Control

E.

Network Control

From a security perspective, how should the Root Bridge be determined in a Spanning Tree Protocol (STP) environment?

A.

Manually selected and defined by the network architect or engineer.

B.

Defined by selecting the highest Bridge ID to be the root bridge.

C.

Automatically selected by the Spanning Tree Protocol (STP).

D.

All switch interfaces become root bridges in an STP environment.