Advantage of monitoring network traffic

Assignment Help Basic Computer Science
Reference no: EM133300680

Question 1.

Which of the following advantages of network traffic monitoring will be achieved by establishing SLAs and compliance applicable to users or consumers by providing complete infrastructure information while drafting the SLA?

Optimization

Utilization

Proactive

Minimizing risk

Question 2.

Which of the following best describes how the logging approach called "centralized logging" is different from its counterpart approach?

It generates a log for a failed or successful modification of user credentials and access rights

It generates a log record for a successful or failed alteration of user access privileges

It generates logs for changes in firewall policy

It generates a log record for exceeding thresholds

Question 3.

Which following is NOT an advantage of monitoring network traffic?

Avoiding bandwidth bottlenecks

Investigating security breaches

Optimizing network performance

Hiding data flows in a network

Question 4.

Which of the following best describes quality of service (QoS)?

It is an access-control mechanism for controlling the interactions between objects based on their integrity or level of trustworthiness

It is a mechanism through which tasks of interest can be found within normalized event data

It is a bandwidth reservation mechanism

It is a mechanism by which a system or application either saves records on a local disk or sends them over a network

Question 5.

Which command can display the contents of a log file one page per time while monitoring and analysis of Linux logs?

more

tail

less

head

Question 6.

Which of the following steps of centralized logging, monitoring, and analysis uses the mechanisms syslog UDP, syslog TCP, and encrypted syslog?

Log collection

Log transmission

Log normalization

Log storage

Question 7

Which of the following filters can be used by a network defender to detect TCP ping sweep attempts?

tcp.flags==012

udp.dstport==7

tcp.flags==0x00

tcp.dstport==7

Question 8

Which of the following commands is used to view Cisco ASA firewall logs?

cat

fw log

show logging

tail

Question 9

Daniel, a network investigator was analyzing the network traffic in the organization. During the analysis, he identified traffic from an IP address containing signatures that indicate an attempt to scan the network for identifying possible weaknesses. Daniel verified that traffic and concluded that it is an port scanning attempt. Which of the following types of suspicious traffic signature Daniel has identified in the above scenario?

Reconnaissance

Unauthorized access

Informational

Denial of Service

Question 10.

Which of the following types of log correlation can pull in different sources of information such as rule correlation, vulnerability correlation, and profile (fingerprint) correlation?

Micro-level correlation

Macro-level correlation

Rule correlation

Field correlation

Question 11.

Identify the advantage of monitoring network traffic.

Minimizing network performance

Finding unnecessary and vulnerable applications

Evading signs of malicious activity

Hiding data flows in a network

Reference no: EM133300680

Questions Cloud

What is ethics in business and characteristics of ethics : What is ethics in business, what are the characteristics of ethics in business, why ethics are important in business and why businesses must be ethical.
Employee engagement-work from home flexibility : Employee engagement is very low due to 'Work from Home' flexibility and teams are not able to communicate. How can this be improved?
Why would a bank prefer to have a positive or negative gap : What impact does this have on the other categories of a bank's balance sheet, and how may this impact the overall economy?
Suricata with respect to reputation detection : What are the advantages and disadvantages of Snort,Bro and Suricata with respect to reputation detection?
Advantage of monitoring network traffic : Identify the advantage of monitoring network traffic. Which of the following commands is used to view Cisco ASA firewall logs?
Why tesla moving its headquarters from california to texas : why is Tesla moving its headquarters from California to Texas? What are his objections to California? What are the advantages of having Texas as the location
Defined in executive order as systems and assets : Critical Infrastructure is defined in the Executive Order(EO) as "systems and assets, whether physical or virtual, so vital to the United States
What year would that be from today : If a municipal worker takes early retirement this year at age 55, what is her life expectancy? What year would that be (from today?
Create linear hyperplane : For linearly separable problems, perceptron learning algorithm will create a linear hyperplane that separates the data perfectly.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Company publications

Why is it important to have a consistent logo picture throughout all of a company's publications, including its website?

  What will you advise jeff so that make an informed decision

What will you advise Jeff so that he can make an informed decision? Justify your response

  Significant impact on businesses and industries

We have viewed how Blockchain has made a significant impact on businesses and industries.

  What positive value of q will maximize total profit

What positive value of Q will maximize total profit? Remember, letting MR = MC signals the objective of total profit maximization. Solve MR = MC for Q.

  Designing a social networking website

Your employer has tasked you with designing a social networking website. You are free to design either a blog, a micro-blog, or a wiki.

  Find the names of five different cyber viruses

Use a search engine to find the names of five different cyber viruses.

  Republican party national committee

You are the web master for the Republican Party National Committee. How can you best minimize attacks and protect the integrity of your site?

  Business Processes

Business processes can be identified everywhere, from ordering a sandwich at a local cafe´ to booking a flight on the website of an airline.

  Multi-international corporation

You have just been hired as an information security engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple.

  Organization leadership and decision making

Research Paper For Organization Leadership And Decision Making

  Research on diversity

Research on diversity. Discuss the different types and why each is important within itself.

  Discusses breach or violation of regulation

Discusses a breach or violation of a regulation, such as HIPAA, or of a standard such as PCI-DSS, GLBA, or FERPA.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd