1. Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
Select one:
Snort
Nmap
SIEM
Netflow
2. Which tool can identify malicious traffic by comparing packet contents to known attack signatures?
Select one:
Zenmap
IDS
Netflow
Nmap
3. Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information about the traffic that is traversing the network?
Select one:
NetFlow
Telnet
NAT
HTTPS
4. What type of attack disrupts services by overwhelming network devices with bogus traffic?
Select one:
DDoS
port scans
zero-day
brute force
5. What is the last stage of the Cyber Kill Chain framework?
Select one:
gathering target information
remote control of the target device
malicious action
creation of malicious payload