Which of the following is true about private IP addresses?
A. they are assigned by the IANA
B. they are not routable on the Internet
C. they are targeted by attackers
D. NAT was designed to conserve them
Answer: B
You might also like to view...
When overriding a superclass method and calling the superclass version from the subclass method, failure to prefix the superclass method name with the keyword super and a dot (.) in the superclass method call causes ________.
a. a compile-time error. b. a syntax error. c. infinite recursion. d. a runtime error.
What is the core relative to a computer?
What will be an ideal response?
State one function that was reused in the Smooth Motion app from a previous chapter: _______.
Fill in the blank(s) with the appropriate word(s).
Provide steps to log file preparation in security onion.
Because log file normalization is important, log analysis tools often include log normalization features. Tools that do not include such features often rely on plugins for log normalization and preparation. The goal of these plugins is to allow log analysis tools to normalize and prepare the received log files for tool consumption. The Security Onion appliance relies on a number of tools to provide log analysis services. ELSA, Bro, Snort and SGUIL are arguably the most used tools. ELSA (Enterprise Log Search and Archive) is a solution to achieve the following: ? Normalize, store, and index logs at unlimited volumes and rates. ? Provide a simple and clean search interface and API. ? Provide an infrastructure for alerting, reporting and sharing logs. ? Control user actions with local or LDAP/AD-based permissions. ? Plugin system for taking actions with logs. ? Exist as a completely free and open-source project. Bro is a framework designed to analyze network traffic and generate event logs based on it. Upon net- work traffic analysis, Bro creates logs describing events such as the following: ? TCP/UDP/ICMP network connections ? DNS activity ? FTP activity ? HTTPS requests and replies ? SSL/TLS handshakes Snort and SGUIL Snort is an IDS that relies on pre-defined rules to flag potentially harmful traffic. Snort looks into all portions of network packets (headers and payload), looking for patterns defined in its rules. When found, Snort takes the action defined in the same rule. SGUIL provides a graphical interface for Snort logs and alerts, allowing a security analyst to pivot from SGUIL into other tools for more information. For example, if a potentially malicious packet is sent to the organization web server and Snort raised an alert about it, SGUIL will list that alert. The analyst can then right-click that alert to search the ELSA or Bro databases for a better understanding of the event. Note: The directory listing may be different than the sample output shown below.