1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What level security event is the most critical
0
What type of "log collector" can generate syslog messages from Cisco devices as well as UNIX or Linux servers?
syslog
In order to sniff network traffic, what must be enabled on the switch?
port mirroring
You want to identify the traffic that is generated and sent through a network by a specific application on a device.
protocol analyzer
What is the core function of IPAM?
To scan DHCP and DNS servers and log IP address usage to a database
What tool tries to identify which TCP and UDP ports are listening>
port scanner
Which of the following is used for defining:
Who is doing what
When they are doing it
Summary of the relationship
Memorandum of Understanding (MOU)
A __________ is a step-by-step process that outlines how to implement a specific action.
procedure
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before you implement that device?
change management
Of the following, which one is NOT one of the three network planes?
security plane
What term describes a systematic approach to ensuring that the desired state of an IT system is maintained throughout its lifecycle?
configuration management
Which of the following is NOT true regarding policies?
frequently change
What is the name of the computer that queries agents and gathers responses by sending messages?
manager
Which of the following is NOT a benefit of "Log Collectors"?
speed
What term describes an inconsistent rate of packet delivery?
jitter
A ____________ allows inspection of traffic received by a host or passing over a network link.
protocol analyzer
Which of the following is a contract in which both parties agree not to share proprietary or confidential information gathered during the business relationship?
non disclosure agreement
Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host.
Which protocol will the software use to detect the problem?
SNMP
A ___________ is a general framework that guides an organization to achieve its goals.
policy