Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
Correct Answer:B
Which of the following methods is a behavior-based IDS detection method?
Correct Answer:C
Which of the following is allowed by a company to be addressed directly from the public network and is hardened to screen the rest of its network from security exposure?
Correct Answer:C
Which of the following statements about the traceroute utility are true?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:BC
Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?
Correct Answer:A
Which of the following DNS records is used for host name to IPv6 address resolution?
Correct Answer:D