SlideShare a Scribd company logo
1 of 1
Download to read offline
Mayu is responsible for the security of her company's server farm. She has some extra money left
in her budget that needs to be spent by the end of the fiscal year. She wants to find a technology
that could potentially alert her to any malicious traffic on the network, but she is concerned that it
might start blocking legitimate traffic. Which of the following should she consider implementing?
a. HIPS
b. NIPS
c. NIDS
d. HIDS
Giovanni has discovered that a number of local executives stop into a nearby coffee shop for
early-morning networking and business discussions. Many of them use their smartphones and
laptops to conduct business while they are there. Which of the following might Giovanni decide to
use as part of a reconnaissance plan?
a. NIDS
b. Packet analyzer
c. DMZ
d. NIPS
Kiki has just been hired to perform a penetration test for an organization as if she were an external
attacker. Which of the following might she do as part of the initial reconnaissance process?
a. Social media profiling
b. Router ACL review
c. Log analysis
d. WEP cracking
Anisa has discovered that a server in the data center has users connecting to it via Telnet to
perform certain tasks. She knows they should be using SSH to perform these tasks instead. Which
of the following should she do next?
a. Install a network intrusion detection system.
b. Perform a vulnerability scan.
c. Use a network topology discovery tool.
d. Perform a router/firewall ACL review.

More Related Content

Similar to Mayu is responsible for the security of her companys server.pdf

Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City SurveillanceSunny Tan
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...Dana Gardner
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsJay Nagar
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringLancope, Inc.
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsIRJET Journal
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Network cloaking sansv2_
Network cloaking sansv2_Network cloaking sansv2_
Network cloaking sansv2_CMR WORLD TECH
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinarLancope, Inc.
 

Similar to Mayu is responsible for the security of her companys server.pdf (20)

Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City Surveillance
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Icmis
IcmisIcmis
Icmis
 
Network cloaking sansv2_
Network cloaking sansv2_Network cloaking sansv2_
Network cloaking sansv2_
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Trends.pdf
Trends.pdfTrends.pdf
Trends.pdf
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
 

More from acmefit

What can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdfWhat can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdfacmefit
 
We use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdfWe use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdfacmefit
 
The lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdfThe lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdfacmefit
 
Struter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdfStruter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdfacmefit
 
Question 10 Which of the following cannot be said regardin.pdf
Question 10  Which of the following cannot be said regardin.pdfQuestion 10  Which of the following cannot be said regardin.pdf
Question 10 Which of the following cannot be said regardin.pdfacmefit
 
Q5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdfQ5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdfacmefit
 
PF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdfPF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdfacmefit
 
Please answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdfPlease answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdfacmefit
 
please solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdfplease solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdfacmefit
 
a Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdfa Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdfacmefit
 
please help me with the case study Read the case study .pdf
please help me with the case study      Read the case study .pdfplease help me with the case study      Read the case study .pdf
please help me with the case study Read the case study .pdfacmefit
 
Note Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdfNote Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdfacmefit
 
Country Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdfCountry Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdfacmefit
 
ItemNodeh include ltiostreamgt include ltstring.pdf
ItemNodeh    include ltiostreamgt include ltstring.pdfItemNodeh    include ltiostreamgt include ltstring.pdf
ItemNodeh include ltiostreamgt include ltstring.pdfacmefit
 
Consulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdfConsulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdfacmefit
 
I cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdfI cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdfacmefit
 
fill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdffill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdfacmefit
 
An estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdfAn estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdfacmefit
 
Far from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdfFar from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdfacmefit
 
Exhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdfExhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdfacmefit
 

More from acmefit (20)

What can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdfWhat can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdf
 
We use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdfWe use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdf
 
The lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdfThe lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdf
 
Struter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdfStruter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdf
 
Question 10 Which of the following cannot be said regardin.pdf
Question 10  Which of the following cannot be said regardin.pdfQuestion 10  Which of the following cannot be said regardin.pdf
Question 10 Which of the following cannot be said regardin.pdf
 
Q5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdfQ5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdf
 
PF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdfPF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdf
 
Please answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdfPlease answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdf
 
please solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdfplease solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdf
 
a Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdfa Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdf
 
please help me with the case study Read the case study .pdf
please help me with the case study      Read the case study .pdfplease help me with the case study      Read the case study .pdf
please help me with the case study Read the case study .pdf
 
Note Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdfNote Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdf
 
Country Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdfCountry Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdf
 
ItemNodeh include ltiostreamgt include ltstring.pdf
ItemNodeh    include ltiostreamgt include ltstring.pdfItemNodeh    include ltiostreamgt include ltstring.pdf
ItemNodeh include ltiostreamgt include ltstring.pdf
 
Consulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdfConsulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdf
 
I cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdfI cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdf
 
fill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdffill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdf
 
An estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdfAn estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdf
 
Far from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdfFar from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdf
 
Exhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdfExhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdf
 

Recently uploaded

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Mayu is responsible for the security of her companys server.pdf

  • 1. Mayu is responsible for the security of her company's server farm. She has some extra money left in her budget that needs to be spent by the end of the fiscal year. She wants to find a technology that could potentially alert her to any malicious traffic on the network, but she is concerned that it might start blocking legitimate traffic. Which of the following should she consider implementing? a. HIPS b. NIPS c. NIDS d. HIDS Giovanni has discovered that a number of local executives stop into a nearby coffee shop for early-morning networking and business discussions. Many of them use their smartphones and laptops to conduct business while they are there. Which of the following might Giovanni decide to use as part of a reconnaissance plan? a. NIDS b. Packet analyzer c. DMZ d. NIPS Kiki has just been hired to perform a penetration test for an organization as if she were an external attacker. Which of the following might she do as part of the initial reconnaissance process? a. Social media profiling b. Router ACL review c. Log analysis d. WEP cracking Anisa has discovered that a server in the data center has users connecting to it via Telnet to perform certain tasks. She knows they should be using SSH to perform these tasks instead. Which of the following should she do next? a. Install a network intrusion detection system. b. Perform a vulnerability scan. c. Use a network topology discovery tool. d. Perform a router/firewall ACL review.