NETWORK SECURITY
FIREWALLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
The workstation is using NetBIOS to access shared resources on the server.
|
|
A denial of service (DoS) attack on the server is in progress.
|
|
The workstation is accessing messages from the email service on the server.
|
|
The workstation is synchronizing its local time with the time on the server.
|
Detailed explanation-1: -Intrusion detection & prevention systems They watch network traffic go by and log suspicious traffic. An IDS could be on the network or the end device. Depending on where it is, it is called a network-based IDS (NIDS) or host-based IDS (HIDS). A NIDS is usually connected to a tap or span port of a switch.
Detailed explanation-2: -IDS/IPS monitors all traffic on the network to identify any known malicious behavior. One of the ways in which an attacker will try to compromise a network is by exploiting a vulnerability within a device or within software.
Detailed explanation-3: -Network traffic analysis (NTA) is a method of monitoring network availability and activity to identify anomalies, including security and operational issues. Common use cases for NTA include: Collecting a real-time and historical record of what’s happening on your network.
Detailed explanation-4: -Port 80 is the port number assigned to commonly used internet communication protocol, Hypertext Transfer Protocol (HTTP).