What kind of tool is often used to capture and analyze network traffic?
Security+ Lesson5

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 6+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Network mapper
Protocol analyzer
Wireless analyzer
Database vulnerability tester
Answer explanation
Network analyzer captures and analyzes network traffic. It can read packet headers to determine traffic patterns or view protocol information in depth. It is also known as a packet analyzer or protocol analyzer.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have implemented a passive monitoring system that is designed to keep administrators aware of malicious activity and can record detected intrusions in a database and send alert notifications so that the administrators can take action. Which of the following have you implemented?
Stateful firewall
Application layer firewall
IDS
IPS
Answer explanation
You have implemented IDS as intrusion detection systems are fundamentally passive monitoring systems designed to keep administrators aware of malicious activity: they can record detected intrusions in a database and send alert notifications, but they rely on humans to take action. IDS will never delay or interrupt traffic due to a false positive.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following Syslog severity levels is an error or a problem condition that is immediately harmless or correctable but might need user review?
Error
Warning
Informational
Notice
Answer explanation
The severity level is an essential concept for event logging in general. Syslog defines eight levels, ranging from emergency messages about severe error conditions to detailed information on everyday activities that can be used to troubleshoot application functions. The warning is an error or a problem condition that is immediately harmless or correctable but might need user review.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are asked to analyze the aggregated events to find useful data that might need additional human review. Which of the following SIEM software features will you use?
Log retention
Alerts
Correlation
Aggregation
Answer explanation
Correlation analyzes aggregated events to find useful data that might need additional human review. Correlation engines work by finding relationships and trends within a large volume of events, filtering out irrelevant data, and highlighting what is most likely to be of interest to administrators. For example, if an unfamiliar application is linked to a known-bad IP address, it becomes more suspect even if nothing is obviously wrong with it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What SNMP component is a unique number corresponding to an object property that can be monitored on a managed device?
MIB
Manager
Agent
OID
Answer explanation
Object Identifier (OID) is a unique number corresponding to an object property that can be monitored on a managed device. For example, on a switch, the up or down status of a particular interface might be an object, as would be its rate of incoming traffic. (The actual value of an object is called a variable.)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following commands will display the last 30 lines of a file named logfile2.txt?
head -n 30 logfile2.txt
tail -n 30 logfile2.txt
grep -n 30 logfile2.txt
cat -n 30 logfile2.txt
Answer explanation
The tail command retrieves and displays the last part of a file. The following command will display the last 30 lines of a file named logfile2.txt:
tail -n 30 logfile2.txt
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of proxy would you use to mediate communications between LAN clients and internet servers but require client-side configuration?
Forward
Reverse
Transparent
Anonymous
Answer explanation
Forward proxies mediate communications between LAN clients and internet servers but require client-side configuration. They’re often used on small but heavily secured networks.
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your department has implemented a decoy having no useful resources and isolated it from the rest of the network so that compromising it won’t even be useful for mounting an inside attack. What technique is being used?
NGFW
IPS
Honeypot
Anomaly analysis
Answer explanation
A honeypot system is designed to be attractive and accessible to attackers. It might be completely open, or it might have an outwardly reasonable but flawed or inadequate level of security. In truth, it’s a decoy: the honeypot has no useful resources, and it’s isolated from the rest of the network (in a DMZ, for example) so that compromising it won’t even be useful for mounting an inside attack. Instead, it’s monitored to gather information on attackers without actually risking the consequences of an attack on real systems or other network locations. More sophisticated decoys live right among functional systems and files, but since legitimate users never access them, unexpected communications are automatically suspicious.
Similar Resources on Quizizz
12 questions
Client-Side Network Configuration Quiz

Quiz
•
Professional Development
13 questions
Explore 2022 - NSX-T 3.2 ATP

Quiz
•
Professional Development
12 questions
CySA+ Tools

Quiz
•
Professional Development
7 questions
Network - Test 3

Quiz
•
Professional Development
10 questions
IT ENGLISH: Research Project Topics - MS Active Directory

Quiz
•
Professional Development
9 questions
11142020_A+_Lesson_10_Quiz

Quiz
•
Professional Development
10 questions
EY GDS Bootcamp - TRA & TPA

Quiz
•
Professional Development
10 questions
IT ENGLISH: Research Project Topics - Windows PowerShell

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade