You have just found a user who has performed an improper utilization of resources inside the organization both intentionally and unintentionally. This user has just provided you with a working example of which of the following?
You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule: ipchains -A input -p TCP -s 0.0.0.0/0 -d 10.0.10.0/24 5000:10000 -j DENY What is the function of this rule?
You are configuring your Snort rules and you wish to tell Snort to log and send notice when a type of packet is received, what rule action syntax will you use?
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm is indicating an intrusion when there is no actual intrusion?
Your network is a mixed environment of Windows, Linux, and UNIX, computers. The routers are primarily Cisco and the network uses a T-1 to connect to the Internet. You are experimenting with setting up a mail server in a production environment for internal use only. You do not want this mail server to receive any requests from anywhere but the internal network. Therefore you have decided to block incoming SMTP traffic at the Firewall. Which port will you block at the Firewall?
Felix
5 days agoSunshine
10 days agoRosalia
11 days agoMose
20 days agoTerrilyn
1 months agoMarcos
1 months agoMary
1 months agoMagdalene
2 months agoCarmen
2 months agoLynelle
2 months agoViki
2 months agoQueen
4 months agoBarbra
5 months agoBeula
5 months ago