A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?
A. tracert
B. netstat
C. ping
D. nslookup
Answer: B. netstat
You might also like to view...
To begin reviewing a document that contains text insertions, deletions, and comments, click the ________ button
A) Track Changes B) Next C) Review D) Track
Case-Based Critical Thinking QuestionsCase 8-1James created a table of his school soccer team schedule that will be placed on the team's Web page. The table contains four columns: Opponent, Home/Away, Date, and Start Time. The table will contain 10 rows. James has some problems with formatting the table and asks Kyra to help him resolve them.James asks Kyra how he should center data within the table's header cells. Which of the following is the correct answer Kyra gives James?
A. Use the table header element to format the first row of a table. B. Use the table header element to format the first row of a table with the center value for the align attribute. C. Apply the statement text-align: center; to all of the table's header cells. D. none of the above
________ view displays the overall hierarchy of parts of a document, including headings and subheadings
A) Outline B) Master C) Subdocument D) Tracking
What happens if none of the when statements in a case code block match the value of the expression that is evaluated?
A. The statements belonging to the else statement (if present) are executed B. The last when statements belonging to the last when statement is executed C. All of the statements belonging to the when statements are executed D. None of the above