Mayu is responsible for the security of her company's server farm. She has some extra money left in her budget that needs to be spent by the end of the fiscal year. She wants to find a technology that could potentially alert her to any malicious traffic on the network, but she is concerned that it might start blocking legitimate traffic. Which of the following should she consider implementing? a. HIPS b. NIPS c. NIDS d. HIDS Giovanni has discovered that a number of local executives stop into a nearby coffee shop for early-morning networking and business discussions. Many of them use their smartphones and laptops to conduct business while they are there. Which of the following might Giovanni decide to use as part of a reconnaissance plan? a. NIDS b. Packet analyzer c. DMZ d. NIPS Kiki has just been hired to perform a penetration test for an organization as if she were an external attacker. Which of the following might she do as part of the initial reconnaissance process? a. Social media profiling b. Router ACL review c. Log analysis d. WEP cracking Anisa has discovered that a server in the data center has users connecting to it via Telnet to perform certain tasks. She knows they should be using SSH to perform these tasks instead. Which of the following should she do next? a. Install a network intrusion detection system. b. Perform a vulnerability scan. c. Use a network topology discovery tool. d. Perform a router/firewall ACL review..