SlideShare a Scribd company logo
Mayu is responsible for the security of her company's server farm. She has some extra money left
in her budget that needs to be spent by the end of the fiscal year. She wants to find a technology
that could potentially alert her to any malicious traffic on the network, but she is concerned that it
might start blocking legitimate traffic. Which of the following should she consider implementing?
a. HIPS
b. NIPS
c. NIDS
d. HIDS
Giovanni has discovered that a number of local executives stop into a nearby coffee shop for
early-morning networking and business discussions. Many of them use their smartphones and
laptops to conduct business while they are there. Which of the following might Giovanni decide to
use as part of a reconnaissance plan?
a. NIDS
b. Packet analyzer
c. DMZ
d. NIPS
Kiki has just been hired to perform a penetration test for an organization as if she were an external
attacker. Which of the following might she do as part of the initial reconnaissance process?
a. Social media profiling
b. Router ACL review
c. Log analysis
d. WEP cracking
Anisa has discovered that a server in the data center has users connecting to it via Telnet to
perform certain tasks. She knows they should be using SSH to perform these tasks instead. Which
of the following should she do next?
a. Install a network intrusion detection system.
b. Perform a vulnerability scan.
c. Use a network topology discovery tool.
d. Perform a router/firewall ACL review.

More Related Content

Similar to Mayu is responsible for the security of her companys server.pdf

Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City Surveillance
Sunny Tan
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
Dharmendra Rama
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
Abaram Network Solutions
 
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
Dana Gardner
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
Jay Nagar
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Lancope, Inc.
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET Journal
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
FindWhitePapers
 
Icmis
IcmisIcmis
Network cloaking sansv2_
Network cloaking sansv2_Network cloaking sansv2_
Network cloaking sansv2_
CMR WORLD TECH
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
Avinash Sinha
 
Trends.pdf
Trends.pdfTrends.pdf
Trends.pdf
photosoup
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
Lancope, Inc.
 

Similar to Mayu is responsible for the security of her companys server.pdf (20)

Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City Surveillance
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Icmis
IcmisIcmis
Icmis
 
Network cloaking sansv2_
Network cloaking sansv2_Network cloaking sansv2_
Network cloaking sansv2_
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Trends.pdf
Trends.pdfTrends.pdf
Trends.pdf
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
 

More from acmefit

What can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdfWhat can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdf
acmefit
 
We use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdfWe use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdf
acmefit
 
The lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdfThe lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdf
acmefit
 
Struter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdfStruter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdf
acmefit
 
Question 10 Which of the following cannot be said regardin.pdf
Question 10  Which of the following cannot be said regardin.pdfQuestion 10  Which of the following cannot be said regardin.pdf
Question 10 Which of the following cannot be said regardin.pdf
acmefit
 
Q5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdfQ5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdf
acmefit
 
PF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdfPF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdf
acmefit
 
Please answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdfPlease answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdf
acmefit
 
please solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdfplease solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdf
acmefit
 
a Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdfa Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdf
acmefit
 
please help me with the case study Read the case study .pdf
please help me with the case study      Read the case study .pdfplease help me with the case study      Read the case study .pdf
please help me with the case study Read the case study .pdf
acmefit
 
Note Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdfNote Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdf
acmefit
 
Country Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdfCountry Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdf
acmefit
 
ItemNodeh include ltiostreamgt include ltstring.pdf
ItemNodeh    include ltiostreamgt include ltstring.pdfItemNodeh    include ltiostreamgt include ltstring.pdf
ItemNodeh include ltiostreamgt include ltstring.pdf
acmefit
 
Consulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdfConsulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdf
acmefit
 
I cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdfI cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdf
acmefit
 
fill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdffill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdf
acmefit
 
An estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdfAn estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdf
acmefit
 
Far from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdfFar from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdf
acmefit
 
Exhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdfExhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdf
acmefit
 

More from acmefit (20)

What can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdfWhat can we say about these results Smokers have a nonstat.pdf
What can we say about these results Smokers have a nonstat.pdf
 
We use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdfWe use the recursion xixi1+i1iN We use 00 You need to o.pdf
We use the recursion xixi1+i1iN We use 00 You need to o.pdf
 
The lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdfThe lifespan of the Ebola virus on flat dry surfaces has a n.pdf
The lifespan of the Ebola virus on flat dry surfaces has a n.pdf
 
Struter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdfStruter Partnership tiene un capital total de socios de 460.pdf
Struter Partnership tiene un capital total de socios de 460.pdf
 
Question 10 Which of the following cannot be said regardin.pdf
Question 10  Which of the following cannot be said regardin.pdfQuestion 10  Which of the following cannot be said regardin.pdf
Question 10 Which of the following cannot be said regardin.pdf
 
Q5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdfQ5 5 marks For a natural number e let We denote the domai.pdf
Q5 5 marks For a natural number e let We denote the domai.pdf
 
PF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdfPF1224A Journalizing withdrawal of cash from partnership .pdf
PF1224A Journalizing withdrawal of cash from partnership .pdf
 
Please answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdfPlease answer the 3 questions below thank you in advance Wh.pdf
Please answer the 3 questions below thank you in advance Wh.pdf
 
please solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdfplease solve this Operators in the same row have the same pr.pdf
please solve this Operators in the same row have the same pr.pdf
 
a Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdfa Suppose R is a partial order over set A Prove or disprov.pdf
a Suppose R is a partial order over set A Prove or disprov.pdf
 
please help me with the case study Read the case study .pdf
please help me with the case study      Read the case study .pdfplease help me with the case study      Read the case study .pdf
please help me with the case study Read the case study .pdf
 
Note Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdfNote Use the Tax Tables to calculate the answers to the pro.pdf
Note Use the Tax Tables to calculate the answers to the pro.pdf
 
Country Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdfCountry Financial a financial services company uses survey.pdf
Country Financial a financial services company uses survey.pdf
 
ItemNodeh include ltiostreamgt include ltstring.pdf
ItemNodeh    include ltiostreamgt include ltstring.pdfItemNodeh    include ltiostreamgt include ltstring.pdf
ItemNodeh include ltiostreamgt include ltstring.pdf
 
Consulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdfConsulte la tabla a continuacin que muestra los datos de lo.pdf
Consulte la tabla a continuacin que muestra los datos de lo.pdf
 
I cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdfI cant seem to figure out what I am doing wrong in my PyCha.pdf
I cant seem to figure out what I am doing wrong in my PyCha.pdf
 
fill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdffill in the blank What is incorrect about an SCorp a Owne.pdf
fill in the blank What is incorrect about an SCorp a Owne.pdf
 
An estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdfAn estimated regression equation was developed to predict th.pdf
An estimated regression equation was developed to predict th.pdf
 
Far from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdfFar from being rigid and inflexible the doctrine of precede.pdf
Far from being rigid and inflexible the doctrine of precede.pdf
 
Exhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdfExhibit Multiplier The marginal propensity to consume is 0.pdf
Exhibit Multiplier The marginal propensity to consume is 0.pdf
 

Recently uploaded

MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 

Recently uploaded (20)

MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 

Mayu is responsible for the security of her companys server.pdf

  • 1. Mayu is responsible for the security of her company's server farm. She has some extra money left in her budget that needs to be spent by the end of the fiscal year. She wants to find a technology that could potentially alert her to any malicious traffic on the network, but she is concerned that it might start blocking legitimate traffic. Which of the following should she consider implementing? a. HIPS b. NIPS c. NIDS d. HIDS Giovanni has discovered that a number of local executives stop into a nearby coffee shop for early-morning networking and business discussions. Many of them use their smartphones and laptops to conduct business while they are there. Which of the following might Giovanni decide to use as part of a reconnaissance plan? a. NIDS b. Packet analyzer c. DMZ d. NIPS Kiki has just been hired to perform a penetration test for an organization as if she were an external attacker. Which of the following might she do as part of the initial reconnaissance process? a. Social media profiling b. Router ACL review c. Log analysis d. WEP cracking Anisa has discovered that a server in the data center has users connecting to it via Telnet to perform certain tasks. She knows they should be using SSH to perform these tasks instead. Which of the following should she do next? a. Install a network intrusion detection system. b. Perform a vulnerability scan. c. Use a network topology discovery tool. d. Perform a router/firewall ACL review.