Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain.Which of the following tools would aid her to decipher the network traffic?
A. Vulnerability Scanner
B. NMAP
C. NETSTAT
D. Packet Analyzer
Answer: C. NETSTAT
Computer Science & Information Technology
You might also like to view...
Which of the following is not a function of a utility provided by an operating system?
A. copying files B. listing files C. printing files D. translating C++ programs
Computer Science & Information Technology
The ________ Mode is a toggle; click it once to activate it and click it again to deactivate it
Fill in the blank(s) with correct word
Computer Science & Information Technology
A good name for a variable that will contain a first name would be "person's_name."
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The command that joins selected cells into one larger cell and then centers the contents is called _____________.
a. Merge & Center b. Group & Center c. Center & Align d. Create & Center
Computer Science & Information Technology