List the four categories of suspicious traffic categories.
What will be an ideal response?
Informational
Reconnaissance
Unauthorized access
Denial of service
You might also like to view...
Which of the following is true? Before you answer, define smaller in this context.
a. When class D is derived from class B, the base class is usually smaller. b. A subclass is usually smaller than the superclass. c. A parent class is usually larger than a child class. d. A class that inherits is usually larger than the class from which it inherits.
Which of the following viruses creates a peer-to-peer botnet?
A) Zafi.d B) Shamoon C) Mirai D) Gameo ver ZeuS
When a SmartArt graphic is selected, the Shape Fill button appears in the ________ group under the Format tab
A) Shape Styles B) Arrange C) Shape D) WordArt Styles
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?
A. /etc/cron.deny B. /etc/cron.d/cron.deny C. /etc/cron.allow D. /etc/cron.d/cron.allow