00:00

QUESTION 91

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Correct Answer: D

QUESTION 92

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABD

QUESTION 93

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Correct Answer: B

QUESTION 94

What is the maximum size of an IP datagram for Ethernet?

Correct Answer: C

QUESTION 95

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Correct Answer: D