RCS 2
RCS 2
To filter all traffic going on an internal web server from the Internet side of the
firewall, port filter on the firewall.
8080
21
80
25
METASPLOIT ability consist of
Smart exploitation.
Password auditing.
Web application scanning.
None of these.
Snort-based IDS contains components
Packet Decoder.
Preprocessors.
Detection Engine.
All of these.
TCPdump is inspect traffic, a command line tool and parsing the data such as
Netcat
Packet sniffing
Metasploit
None of these
True
False
XMAS scan.
NULL SCAN.
Both a and b.
None of these.
Dynamic sniffing is difficult to distinguish.
True
False
One of the following deal with network intrusion detection and traffic
analysis
Zed Attack
Snort
HTC-Hydra
Wireshark
Traffic probe which include one of the flollowing
Network intrusion detection.
High speed traffic processing.
Network traffic management.
None of these