![]() _ī) False B) False Some vulnerability scanners feature a class of attacks called _, that are so dangerous they should only be used in a lab environment.ĭ) disruptive C) destructive Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.ī) False B) False _ is the action of luring an individual into committing a crime to get a conviction.ĭ) Padding A) Entrapment All IDPS vendors target users with the same levels of technical and security expertise.ī) False B) False A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _ī) False B) False A(n) event is an indication that a system has just been attacked or is under attack. _ī) False A) True A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.ī) False A) True Port explorers are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. ![]() ![]() A(n) _ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.ĭ) DoS A) IDPS A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss.
0 Comments
Leave a Reply. |