Which Host-based IDS (HIDS) method of log monitoring utilizes a list of keywords or phrases that define the events of interest for the analyst, then takes a list of keywords to watch for and generates alerts when it sees matches in log file activity?
Correct Answer:
D
Which of the following is a characteristic of hash operations?
Correct Answer:
D
Which layer of the TCP/IP Protocol Stack Is responsible for port numbers?
Correct Answer:
B
What type of malware is a self-contained program that has the ability to copy itself without parasitically infecting other host code?
Correct Answer:
D
Which of the following tools is used to configure, control, and query the TCP/IP network interface parameters?
Correct Answer:
D