answersLogoWhite

0

1. You notice an unusual spike in TCP and UDP flows from a single internal source to multiple destinations. Describe in detail the steps you would take to determine the type of traffic that this represents.

2. You have observed TCP connections to an IP address. The HTTP connections return a file named a.txt but when you try to retrieve the file with your browser you receive a 404 error code. You do not know the DNS name associated with the IP address (there is no reverse map). Describe the steps you would take to retrieve a.txt. Provide a plausible explanation why another machine on your network is retrieving a.txt but you are not able to do the same.

3. You are presented with a list of known bad DNS names but are not allowed to monitor traffic with network sniffers. You are asked to indicate what names are in use on your network without using a network sniffer. Describe, in detail the steps you would take.

4. You receive a report that an attacker from the external internet has connected inbound via port 443 to remotely control a host on your internal network but you know the firewall blocks inbound connections. Do your best to explain possible reasons for activity.

5. A user reports that although he was logged into a web application at the time, he did not conduct the transaction that the web application purports. We know conclusively that the login has not been shared. What are some possible causes and what you do to investigate them?

User Avatar

Wiki User

15y ago

What else can I help you with?

Continue Learning about Computer Science
Related Questions

Do you need Xbox live to play on a system link?

System link is a way to play with other people on the same network as yourself, so no you do not need live to system link but you do need to be on the same network


What are the Components of a network operating system?

hey i need to know the componetns and protocols of a network operating system hey i need to know the componetns and protocols of a network operating system hey i need to know the componetns and protocols of a network operating system Clarify. This question is like asking "I need to do a surgery. How?" If this question is for homework, and this is how you find answers, you are in serious jeopardy of failing your class. If this is for work, and you lied on your resume, you are SO going to get fired!


Is it true that the strategic monitoring system aids with the identification of implementation problems that need to be corrected?

yes


How do you do Cost benefit analysis on network monitoring manpower?

There are commercial network monitoring products out there that are specifically designed for ease of use and automation of monitoring tasks like NetCrunch. To do a cost-benefit analysis you'd need to determine what your sysadmin(s) are spending their time on day-to-day, how much of their time, and which of those functions can be automated or otherwise shortened by commercial software.


What needs to be configured in order to have effective port monitoring and see all traffic on the network?

This feature is named "port mirror" or SPAN. You need to get a manageable switch to have this feature. You also need to setup a passive monitoring program(ie: WFilter) to monitor the traffic.


What security device is used to monitor network traffic for illegal activities based on known attack signatures?

A network-based intrusion detection system (NIDS) is responsible for monitoring network traffic for signs of illegal activity. Detection is typically based on the identification of unusual network activity that matches known threats or attack-signatures.


How do you use snmp logs in avid ISIS servers?

To use SNMP logs in Avid ISIS servers, you need to enable SNMP monitoring on the server. This will allow you to collect information such as system performance, errors, and alerts on network traffic. You can then use SNMP monitoring tools to analyze and track the data collected from the server's SNMP logs.


When a system not communacting on network or with any other system What is the possiblities you will check?

You need to check the cable.


What services does a network need to run to support RIS or remote installation services?

Active Directory, DNS and DHCP


How does computer monitoring software work?

There are two kinds of monitoring software: one for single PC, the other for lan network. For single computer monitoring, you just need to install the software on the PC that you want to monitor. For LAN monitoring, you need to install the server program to the main computer and install the agent program to client computers. Then you can monitor the remote pcs from the central server.


How do you make a review of related literature about SMS-based appliance monitoring system?

firstly u need 2...


When the tires are rotated does the tire pressure monitoring system indentify the new tire locations?

That depends on the system. Some do, some need to be taught the locations.