Which tool uses a Snort rules file for input and by design triggers Snort alerts?
A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?
You have been tasked with searching for Alternate Data Streams on the following collection of Windows partitions; 2GB FAT16, 6GB FAT32, and 4GB NTFS. How many total Gigabytes and partitions will you need to search?
Which action would be the responsibility of the First Responder once arriving at the scene of a suspected incident as part of a Computer Security Incident Response Plan (CSIRP)?
Enabling port security prevents which of the following?
If a Cisco router is configured with the “service config” configuration statement, which of the following tools could be used by an attacker to apply a new router configuration?
On which layer of the OSI Reference Model does the FWSnort utility function?
Which of the following would be included in a router configuration standard?
Which of the following is best defined as “anything that has the potential to target known or existing vulnerabilities in a system?”
Requiring criminal and financial background checks for new employees is an example of what type of security control?
How would an attacker use the following configuration settings?
What piece of information would be recorded by the first responder as part of the initial System Description?
In order to determine if network traffic adheres to expected usage and complies with technical standards, an organization would use a device that provides which functionality?