To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of protocols and services whenever possible. In addition, the security technician is required to monitor the types of traffic being generated. Which of the following tools is the technician MOST likely to use?

A. Port scanner
B. Network analyzer
C. IPS
D. Audit Logs


Answer: B. Network analyzer

Computer Science & Information Technology

You might also like to view...

What is the broadcast address for a host at 192.168.20.15 using the subnet mask 255.255.255.192?

a. 192.168.20.63 b. 192.168.20.0 c. 192.168.20.127 d. 192.168.20.255 e. None of these answers is correct.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A derived class contains only public instance variables and public methods from the base class. 2. Inheritance refers to a very specialized form of a class. 3. A derived class is a class defined by adding instance variables and methods to an existing class. 4. When you define a derived class, you give only the added instance variables and the added methods as well as all the methods from the base class. 5. The keyword extends indicates polymorphism.

Computer Science & Information Technology

Define or characterize the template facility for C++.

What will be an ideal response?

Computer Science & Information Technology

Special symbols called tags are used in which of the following languages?

A) C# B) HTML/XHTML C) Java D) C++

Computer Science & Information Technology