1.
Which of the following is a protocol analyzer?
2.
Which of the following is MOST often used to allow a client or partner access to a network?
3.
Which of the below options would you consider as a program that constantly observes data traveling over a network?
4.
From the listing of attacks, which analyzes how the operating system (OS) responds to specific network traffic, in an attempt to determine the operating system running in your networking environment?
5.
Which of the following is an example of two-factor authentication for an information system?
6.
Which of the following is the primary method of performing network hardening?