List the four categories of suspicious traffic categories.

What will be an ideal response?


Informational
Reconnaissance
Unauthorized access
Denial of service

Computer Science & Information Technology

You might also like to view...

Which of the following is true? Before you answer, define smaller in this context.

a. When class D is derived from class B, the base class is usually smaller. b. A subclass is usually smaller than the superclass. c. A parent class is usually larger than a child class. d. A class that inherits is usually larger than the class from which it inherits.

Computer Science & Information Technology

Which of the following viruses creates a peer-to-peer botnet?

A) Zafi.d B) Shamoon C) Mirai D) Gameo ver ZeuS

Computer Science & Information Technology

When a SmartArt graphic is selected, the Shape Fill button appears in the ________ group under the Format tab

A) Shape Styles B) Arrange C) Shape D) WordArt Styles

Computer Science & Information Technology

A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? 

A. /etc/cron.deny B. /etc/cron.d/cron.deny C. /etc/cron.allow D. /etc/cron.d/cron.allow

Computer Science & Information Technology