Question 79

- (Topic 2)
Which of the following categories of the network management model is used to detect and log network problems or device failures?

Correct Answer:A

Question 80

- (Topic 2)
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.

Correct Answer:AC

Question 81

- (Topic 1)
Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host?

Correct Answer:D

Question 82

- (Topic 2)
Which of the following types of firewalls forms a session flow table?

Correct Answer:D

Question 83

- (Topic 2)
Which of the following is the main purpose of using OODA loops?

Correct Answer:C

Question 84

- (Topic 1)
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

Correct Answer:A

START GISF EXAM