tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    77. An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

    A. Intrusion Prevention System (IPS)

    B. Protocol analyzer

    C. Vulnerability scanner

    D. Network sniffer



    78. What is the process of logging, recording, and resolving events that take place in an organization.

    A. Incident Management Process

    B. Metrics

    C. Internal Procedure

    D. Security Policy



    < Prev.Page             CEHv9 Home             Next page>