Communication and Network Security
SKILLSET
No description available
Related Questions
- Which type of IDS is best described as an IDS that determines the "normal" usage profile using statistical samples?
- An attack that sends malformed fragmented packets to a target machine is called _________.
- This network device combines the functionality of repeater and the functionality of a bridge.
- Network Intrusion Detection System (NIDS) is regarded as an inline device because of the fact that it can monitor more than one computer. True or false?
- Communication sessions are divided into three distinct modes of operation. Which of these is NOT included in one of these phases?
- Decoding and sequencing packets is done by UDP. True or false?
- In networking technologies Ethernet transmissions occur in frames of 64 to 1518 octets in length. The frames are composed of three of the following. Which one is incorrect?
- When an attacker inserts incorrect information into an ARP cache. This is done when an ARP cache does not have an address cached and a broadcast is sent out for the correct address. This is called what?
- If not appropriately configured, which of the following would rate as the biggest contributor to a denial-of-service attack?
- Which of these actions is taken by an IDS once it determines that an attack is underway?