00:00

QUESTION 66

Which Host-based IDS (HIDS) method of log monitoring utilizes a list of keywords or phrases that define the events of interest for the analyst, then takes a list of keywords to watch for and generates alerts when it sees matches in log file activity?

Correct Answer: D

QUESTION 67

Which of the following is a characteristic of hash operations?

Correct Answer: D

QUESTION 68

Which layer of the TCP/IP Protocol Stack Is responsible for port numbers?

Correct Answer: B

QUESTION 69

What type of malware is a self-contained program that has the ability to copy itself without parasitically infecting other host code?

Correct Answer: D

QUESTION 70

Which of the following tools is used to configure, control, and query the TCP/IP network interface parameters?

Correct Answer: D