Question 49

Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABD

Question 50

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. Users complain of slow traffic on the network. You find that lots of faulty broadcasts are coming from an IP address. You want the Mac address of the source. Which of the following utilities will you use?

Correct Answer:C

Question 51

Which of the following processes is used to convert plain text into cipher text?

Correct Answer:A

Question 52

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Correct Answer:D

Question 53

Which of the following commands is a Packet sniffer?

Correct Answer:A

Question 54

Which of the following can be monitored by using the host intrusion detection system (HIDS)?
Each correct answer represents a complete solution. Choose two.

Correct Answer:BD

START GCIA EXAM