1.
You are the administrator at Certkiller Inc. and you working on shunning attacks to the network. When shunning, why should the shun length be kept short?
2.
You the administrator at Certkiller Inc and you are doing research on the type of attacks that occur in the network. What type of attack typically exploits intrinsic characteristics in the way your network operates?
3.
You are the security administrator at Certkiller Inc. working configuring an IDS. Which IDS guideline should be followed, according to SAFE SMR?
4.
Kathy the security administrator at Certkiller Inc. is working on security management. What type of management provides the highest level of security for devices?
5.
Which IDS guideline should be followed, according to SAFE SMR?
6.
You have hired a new security administrator for your organization. He calls you in the middle of the night and says "I am receiving too many positives" What is talking about?
7.
What is the most likely target during an attack?
8.
When shunning, why should the shun length be kept short?
9.
Which IDS guideline should be followed according to SAFE SMR?
10.
What type of attack typically exploits an intrinsic characteristic in the way your network operates?