Advantage of monitoring network traffic

Assignment Help Basic Computer Science
Reference no: EM133300680

Question 1.

Which of the following advantages of network traffic monitoring will be achieved by establishing SLAs and compliance applicable to users or consumers by providing complete infrastructure information while drafting the SLA?

Optimization

Utilization

Proactive

Minimizing risk

Question 2.

Which of the following best describes how the logging approach called "centralized logging" is different from its counterpart approach?

It generates a log for a failed or successful modification of user credentials and access rights

It generates a log record for a successful or failed alteration of user access privileges

It generates logs for changes in firewall policy

It generates a log record for exceeding thresholds

Question 3.

Which following is NOT an advantage of monitoring network traffic?

Avoiding bandwidth bottlenecks

Investigating security breaches

Optimizing network performance

Hiding data flows in a network

Question 4.

Which of the following best describes quality of service (QoS)?

It is an access-control mechanism for controlling the interactions between objects based on their integrity or level of trustworthiness

It is a mechanism through which tasks of interest can be found within normalized event data

It is a bandwidth reservation mechanism

It is a mechanism by which a system or application either saves records on a local disk or sends them over a network

Question 5.

Which command can display the contents of a log file one page per time while monitoring and analysis of Linux logs?

more

tail

less

head

Question 6.

Which of the following steps of centralized logging, monitoring, and analysis uses the mechanisms syslog UDP, syslog TCP, and encrypted syslog?

Log collection

Log transmission

Log normalization

Log storage

Question 7

Which of the following filters can be used by a network defender to detect TCP ping sweep attempts?

tcp.flags==012

udp.dstport==7

tcp.flags==0x00

tcp.dstport==7

Question 8

Which of the following commands is used to view Cisco ASA firewall logs?

cat

fw log

show logging

tail

Question 9

Daniel, a network investigator was analyzing the network traffic in the organization. During the analysis, he identified traffic from an IP address containing signatures that indicate an attempt to scan the network for identifying possible weaknesses. Daniel verified that traffic and concluded that it is an port scanning attempt. Which of the following types of suspicious traffic signature Daniel has identified in the above scenario?

Reconnaissance

Unauthorized access

Informational

Denial of Service

Question 10.

Which of the following types of log correlation can pull in different sources of information such as rule correlation, vulnerability correlation, and profile (fingerprint) correlation?

Micro-level correlation

Macro-level correlation

Rule correlation

Field correlation

Question 11.

Identify the advantage of monitoring network traffic.

Minimizing network performance

Finding unnecessary and vulnerable applications

Evading signs of malicious activity

Hiding data flows in a network

Reference no: EM133300680

Questions Cloud

What is ethics in business and characteristics of ethics : What is ethics in business, what are the characteristics of ethics in business, why ethics are important in business and why businesses must be ethical.
Employee engagement-work from home flexibility : Employee engagement is very low due to 'Work from Home' flexibility and teams are not able to communicate. How can this be improved?
Why would a bank prefer to have a positive or negative gap : What impact does this have on the other categories of a bank's balance sheet, and how may this impact the overall economy?
Suricata with respect to reputation detection : What are the advantages and disadvantages of Snort,Bro and Suricata with respect to reputation detection?
Advantage of monitoring network traffic : Identify the advantage of monitoring network traffic. Which of the following commands is used to view Cisco ASA firewall logs?
Why tesla moving its headquarters from california to texas : why is Tesla moving its headquarters from California to Texas? What are his objections to California? What are the advantages of having Texas as the location
Defined in executive order as systems and assets : Critical Infrastructure is defined in the Executive Order(EO) as "systems and assets, whether physical or virtual, so vital to the United States
What year would that be from today : If a municipal worker takes early retirement this year at age 55, what is her life expectancy? What year would that be (from today?
Create linear hyperplane : For linearly separable problems, perceptron learning algorithm will create a linear hyperplane that separates the data perfectly.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd