Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Correct Answer:
D
By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ABD
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?
Correct Answer:
B
What is the maximum size of an IP datagram for Ethernet?
Correct Answer:
C
Which of the following is the default port for Simple Network Management Protocol (SNMP)?
Correct Answer:
D