Which security monitoring data type requires the largest storage space?
Correct Answer:
D
Refer to the exhibit.
Which type of log is displayed?
Correct Answer:
A
You also see the 5-tuple in IPS events, NetFlow records, and other event data. In fact, on the exam you may need to differentiate between a firewall log versus a traditional IPS or IDS event. One of the things to remember is that traditional IDS and IPS use signatures, so an easy way to differentiate is by looking for a signature ID (SigID). If you see a signature ID, then most definitely the event is a traditional IPS or IDS event.
What is the difference between the rule-based detection when compared to behavioral detection?
Correct Answer:
D
Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?
Correct Answer:
C
Which security technology allows only a set of pre-approved applications to run on a system?
Correct Answer:
C