Which of the following devices are used to implement Network Address Translation (NAT)?
You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?
You are tasked with configuring your routers with a minimum security standard that includes the following:
l A local Username and Password configured on the router
l A strong privilege mode password
l Encryption of user passwords
l Configuring telnet and ssh to authenticate against the router user database
Choose the configuration that best meets these requirements.
Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?
Each correct answer represents a complete solution. Choose all that apply.
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?
An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.
Which IDS/IPS detection method do the URLs use to detect and prevent an attack?