Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain.Which of the following tools would aid her to decipher the network traffic?

A. Vulnerability Scanner
B. NMAP
C. NETSTAT
D. Packet Analyzer


Answer: C. NETSTAT

Computer Science & Information Technology

You might also like to view...

Which of the following is not a function of a utility provided by an operating system?

A. copying files B. listing files C. printing files D. translating C++ programs

Computer Science & Information Technology

The ________ Mode is a toggle; click it once to activate it and click it again to deactivate it

Fill in the blank(s) with correct word

Computer Science & Information Technology

A good name for a variable that will contain a first name would be "person's_name."

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The command that joins selected cells into one larger cell and then centers the contents is called _____________.

a. Merge & Center b. Group & Center c. Center & Align d. Create & Center

Computer Science & Information Technology