Questions

Now it's time to check your knowledge. Select the best response, and then check your answers, which can be found in the Assessment:

  1. Packet analysis has been around in some form since the _____ as a diagnostic tool to observe data and other information traveling across the network.
    1. 1950s
    2. 1960s
    3. 1970s
    4. 1990s
  1. Packet analysis is used in the real world in many forms. One is the DHS _____system, which monitors for threats.
    1. CARVER
    2. Packet
    3. EINSTEIN
    4. DESTINY3
  1. In the expert system, _____ provides information about typical workflows such as TCP window updates or connection finishes.
    1. Note
    2. Chat
    3. Error
    4. Warn
  2. A ____ provides a snapshot of network traffic during a window of time using Wireshark or Tshark. Characteristics can include utilization, network protocols, and effective throughput forwarding rates.
    1. Round Robin
    2. DORA process
    3. Baseline
    4. WinCheck
  1. Monitoring for threats occurs in one of three ways. _____ is when a system has fallen victim to an attack and the incident response team manages the attack, followed by a forensic exercise.
    1. Proactive
    2. Reactive
    3. Active
    4. Redactive
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.87.156