Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Which of the following is an attack with IP fragments that cannot be reassembled?
What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?
Which of the following statements are true about an IDP rule base notification?
Which of the following wireless security features provides the best wireless security mechanism?
Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?
Which of the following is the default port for POP3?
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.
Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.
Which of the following attacks has been occurred on the wireless network of Adam?
Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?