Deck 2: Analyzing Network Reconnaissance
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/17
العب
ملء الشاشة (f)
Deck 2: Analyzing Network Reconnaissance
1
A threat actor has gone to a local coffee shop and opened a program that can analyze traffic being sent and received on the network. He finds that someone on the network is sending emails using SMTP without encryption, and he can see the contents of the emails. Which of the following programs is he most likely using?
A) netstat
B) dig
C) Wireshark
D) Nessus
A) netstat
B) dig
C) Wireshark
D) Nessus
Wireshark
2
Umberto works for an organization that has created a policy prohibiting the use of open source software unless there is no alternative. He wants to sniff packets on the network, but most of the sniffer applications are open source. Which of the following software packages would adhere to the company's policy?
A) Wireshark
B) EtherApe
C) NetworkMiner
D) Network General
A) Wireshark
B) EtherApe
C) NetworkMiner
D) Network General
Network General
3
A cybersecurity analyst is researching syslog for possible implementation at his organization. He is reading about the elements that syslog messages contain and sees the priority and header fields. Which of the following fields contains the contents of the messages?
A) MSG
B) CONTENT
C) VALUE
D) STAT
A) MSG
B) CONTENT
C) VALUE
D) STAT
MSG
4
Ian, a cybersecurity analyst, wants to use a system to identify when employees are using Telnet on the network by examining only the headers of packets as they traverse the network. Which of the following might he decide to implement to meet this goal?
A) Packet analysis
B) Protocol analysis
C) Traffic analysis
D) Wireless analysis
A) Packet analysis
B) Protocol analysis
C) Traffic analysis
D) Wireless analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
5
Morena wants to use Wireshark to analyze the types of traffic being sent across her company's network. Which of the following types of analysis does she want to perform?
A) Wireless analysis
B) Traffic analysis
C) Packet analysis
D) Protocol analysis
A) Wireless analysis
B) Traffic analysis
C) Packet analysis
D) Protocol analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
6
Talera believes an evil twin might be planted somewhere around her company's office. Which of the following is the best method of finding where it might be located?
A) Protocol analysis
B) Traffic analysis
C) Packet analysis
D) Wireless analysis
A) Protocol analysis
B) Traffic analysis
C) Packet analysis
D) Wireless analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
7
Jorge is analyzing the event logs on a server and sees that someone attempted to log into a user account twice with the incorrect password before logging in successfully. In which of the following general types of logs were these events most likely captured?
A) System
B) Security
C) Application
D) Authentication
A) System
B) Security
C) Application
D) Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
8
Tina wants to determine the fault toleranceof the servers in her data center, and is reviewing the previous 24 months of logs using an analysis tool. Which of the following types of analysis is Tina most likely performing?
A) Conditional analysis
B) Anomaly analysis
C) Behavioral analysis
D) Availability analysis
A) Conditional analysis
B) Anomaly analysis
C) Behavioral analysis
D) Availability analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
9
Thierry wants to implement a method of analyzing network traffic to detect attacks by using a database of known attacks for comparison. Which of the following methods of analysis meets his goal?
A) Signature analysis
B) Behavioral analysis
C) Availability analysis
D) Anomaly analysis
A) Signature analysis
B) Behavioral analysis
C) Availability analysis
D) Anomaly analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
10
Jonquil, a cybersecurityanalyst, has been asked to implement a system that collects information for analysis about traffic flowing through the routers and switches on her company's network. Which of the following protocols should she considerto implement this type of setup?
A) IDS
B) Resource Monitor
C) NetFlow
D) SIEM
A) IDS
B) Resource Monitor
C) NetFlow
D) SIEM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
11
Neo wants to consolidate real-time monitoring and management of security-related information with analysis and reporting of events. Which of the following might he want to implement?
A) IGRP
B) SERP
C) SIEM
D) IMEI
A) IGRP
B) SERP
C) SIEM
D) IMEI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
12
Nichole, a cybersecurity analyst, has received an alert about a potential ping flood on one of the company's Windows servers. She is able to connect to the server via an out-of-band management network. Which of the following native tools might help her verify what is occurring on the server at the moment?
A) Resource Monitor
B) tcpdump
C) Wireshark
D) Network General
A) Resource Monitor
B) tcpdump
C) Wireshark
D) Network General
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
13
Cyndi, a cybersecurity researcher, has been hired to comb through historical data at a large organization after an APT was discovered. She needs to determine the extent of the attack and be able to view various parts of the network's logs to give her the full context of what occurred. Which of the following might best describe the type of analysis she is performing?
A) Packet analysis
B) Retrospective network analysis
C) Signature analysis
D) Anomaly analysis
A) Packet analysis
B) Retrospective network analysis
C) Signature analysis
D) Anomaly analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
14
Match the command switch used with nmap to generate on of the output types
-Interactive
A) (Default)
B) -oN
C) -oX
D) -oG
-Interactive
A) (Default)
B) -oN
C) -oX
D) -oG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
15
Match the command switch used with nmap to generate on of the output types
-Interactive output stored in a file
A) (Default)
B) -oN
C) -oX
D) -oG
-Interactive output stored in a file
A) (Default)
B) -oN
C) -oX
D) -oG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
16
Match the command switch used with nmap to generate on of the output types
-Output in Extensible Markup Language
A) (Default)
B) -oN
C) -oX
D) -oG
-Output in Extensible Markup Language
A) (Default)
B) -oN
C) -oX
D) -oG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
17
Match the command switch used with nmap to generate on of the output types
-Output that can be manipulated using Linux command-line tools
A) (Default)
B) -oN
C) -oX
D) -oG
-Output that can be manipulated using Linux command-line tools
A) (Default)
B) -oN
C) -oX
D) -oG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck