David works as the Security Manager for ABC Inc. He has been assigned a project to detect the attacks over multiple connections and sessions and to count the number of scanned ports in a defined time period.
Which of the following rulebases will he use to accomplish the task?
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
You want to create a binary log file using tcpdump.
Which of the following commands will you use?
Which of the following command-line utilities is used to show the state of current TCP/IP connections?
Which of the following statements about Access control list (ACL) are true?
Each correct answer represents a complete solution. (Choose three.)
In which of the following locations can the Cisco IOS file reside?
Each correct answer represents a complete solution. (Choose all that apply.)
In which of the following steps of firewall log analysis process is aggregation for nodes defined?
Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?
On which of the following interfaces of the router is the clock rate command used?
You work as a Network Administrator at ABC Inc. You want to implement a solution that will automatically disallow connections if an attack is suspected.
Which of the following technologies will you choose to accomplish the task?