Question 6
Mark is monitoring the network traffic on his organization's network. He wants to detect a TCP and UDP ping sweep on his network. Which type of filter will be used to detect this on the network?
Question 7
What is the range for registered ports?
Question 8
A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?
Question 9
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
Question 10
Which of the following policies is used to add additional information about the overall security posture and serves to protect employees and organizations from inefficiency or ambiguity?