Which of the following Unix syslog message priorities is the MOST severe?
Correct Answer:B
What database can provide contact information for Internet domains?
Correct Answer:C
What is the function of the TTL (Time to Live) field in IPv4 and the Hop Limit field in IPv6 In an IP Packet header?
Correct Answer:A
You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?
Correct Answer:C
Which port category does the port 110 fall into?
Correct Answer:A
Which of the following is a signature-based intrusion detection system (IDS) ?
Correct Answer:B