Reference no: EM133300680
Question 1.
Which of the following advantages of network traffic monitoring will be achieved by establishing SLAs and compliance applicable to users or consumers by providing complete infrastructure information while drafting the SLA?
Optimization
Utilization
Proactive
Minimizing risk
Question 2.
Which of the following best describes how the logging approach called "centralized logging" is different from its counterpart approach?
It generates a log for a failed or successful modification of user credentials and access rights
It generates a log record for a successful or failed alteration of user access privileges
It generates logs for changes in firewall policy
It generates a log record for exceeding thresholds
Question 3.
Which following is NOT an advantage of monitoring network traffic?
Avoiding bandwidth bottlenecks
Investigating security breaches
Optimizing network performance
Hiding data flows in a network
Question 4.
Which of the following best describes quality of service (QoS)?
It is an access-control mechanism for controlling the interactions between objects based on their integrity or level of trustworthiness
It is a mechanism through which tasks of interest can be found within normalized event data
It is a bandwidth reservation mechanism
It is a mechanism by which a system or application either saves records on a local disk or sends them over a network
Question 5.
Which command can display the contents of a log file one page per time while monitoring and analysis of Linux logs?
more
tail
less
head
Question 6.
Which of the following steps of centralized logging, monitoring, and analysis uses the mechanisms syslog UDP, syslog TCP, and encrypted syslog?
Log collection
Log transmission
Log normalization
Log storage
Question 7
Which of the following filters can be used by a network defender to detect TCP ping sweep attempts?
tcp.flags==012
udp.dstport==7
tcp.flags==0x00
tcp.dstport==7
Question 8
Which of the following commands is used to view Cisco ASA firewall logs?
cat
fw log
show logging
tail
Question 9
Daniel, a network investigator was analyzing the network traffic in the organization. During the analysis, he identified traffic from an IP address containing signatures that indicate an attempt to scan the network for identifying possible weaknesses. Daniel verified that traffic and concluded that it is an port scanning attempt. Which of the following types of suspicious traffic signature Daniel has identified in the above scenario?
Reconnaissance
Unauthorized access
Informational
Denial of Service
Question 10.
Which of the following types of log correlation can pull in different sources of information such as rule correlation, vulnerability correlation, and profile (fingerprint) correlation?
Micro-level correlation
Macro-level correlation
Rule correlation
Field correlation
Question 11.
Identify the advantage of monitoring network traffic.
Minimizing network performance
Finding unnecessary and vulnerable applications
Evading signs of malicious activity
Hiding data flows in a network