Review Questions
You can find the answers in Appendix A.
-
Which of the following is an example of a well-known open-source IDS tool?
- Nessus
- Snort
- Netcat
- Hping
-
John the Ripper is used for which of the following?
- Remote listener
- Wireless security
- Packer analysis
- Password cracking
-
Which of the following is used to complete a scan by performing all three steps of the TCP session startup?
- Nmap -sS
- Nmap -sT
- Nmap -sU
- Nmap -O
-
You have been asked to find a replacement for Telnet and want to use a secure protocol for data exchange. Which of the following applications would be acceptable?
- WebGoat
- Nessus
- PuTTY
- Helix
-
Which of the following is considered a framework for information security and addresses issues such as governance, systems development life cycles, security assessments, risk management, and incident response?
- ISO 2701
- RFC 2196
- COBIT
- NIST 800-100
-
A ______________ points to a statement in a policy or procedure by which to determine a course of action.
- Procedure...