1. You notice an unusual spike in TCP and UDP flows from a single internal source to multiple destinations. Describe in detail the steps you would take to determine the type of traffic that this represents.
2. You have observed TCP connections to an IP address. The HTTP connections return a file named a.txt but when you try to retrieve the file with your browser you receive a 404 error code. You do not know the DNS name associated with the IP address (there is no reverse map). Describe the steps you would take to retrieve a.txt. Provide a plausible explanation why another machine on your network is retrieving a.txt but you are not able to do the same.
3. You are presented with a list of known bad DNS names but are not allowed to monitor traffic with network sniffers. You are asked to indicate what names are in use on your network without using a network sniffer. Describe, in detail the steps you would take.
4. You receive a report that an attacker from the external internet has connected inbound via port 443 to remotely control a host on your internal network but you know the firewall blocks inbound connections. Do your best to explain possible reasons for activity.
5. A user reports that although he was logged into a web application at the time, he did not conduct the transaction that the web application purports. We know conclusively that the login has not been shared. What are some possible causes and what you do to investigate them?
This feature is named "port mirror" or SPAN. You need to get a manageable switch to have this feature. You also need to setup a passive monitoring program(ie: WFilter) to monitor the traffic.
NetCrunch 8 is an all-in-one monitoring and management solution that is licensed by node (unlike others that charge by app/element/counter/sensor/etc.), and has an embedded SQL database.
You can use either a network hub or a network switch to set up your network
That's part of the operating system. You don't need to install specialized software.That's part of the operating system. You don't need to install specialized software.That's part of the operating system. You don't need to install specialized software.That's part of the operating system. You don't need to install specialized software.
The software needed to set up a WAN network include a router of some sort to have network connectivity. Additionally, software would be needed on every computer that would be connected to the WAN network.
System link is a way to play with other people on the same network as yourself, so no you do not need live to system link but you do need to be on the same network
hey i need to know the componetns and protocols of a network operating system hey i need to know the componetns and protocols of a network operating system hey i need to know the componetns and protocols of a network operating system Clarify. This question is like asking "I need to do a surgery. How?" If this question is for homework, and this is how you find answers, you are in serious jeopardy of failing your class. If this is for work, and you lied on your resume, you are SO going to get fired!
yes
There are commercial network monitoring products out there that are specifically designed for ease of use and automation of monitoring tasks like NetCrunch. To do a cost-benefit analysis you'd need to determine what your sysadmin(s) are spending their time on day-to-day, how much of their time, and which of those functions can be automated or otherwise shortened by commercial software.
This feature is named "port mirror" or SPAN. You need to get a manageable switch to have this feature. You also need to setup a passive monitoring program(ie: WFilter) to monitor the traffic.
A network-based intrusion detection system (NIDS) is responsible for monitoring network traffic for signs of illegal activity. Detection is typically based on the identification of unusual network activity that matches known threats or attack-signatures.
To use SNMP logs in Avid ISIS servers, you need to enable SNMP monitoring on the server. This will allow you to collect information such as system performance, errors, and alerts on network traffic. You can then use SNMP monitoring tools to analyze and track the data collected from the server's SNMP logs.
You need to check the cable.
Active Directory, DNS and DHCP
There are two kinds of monitoring software: one for single PC, the other for lan network. For single computer monitoring, you just need to install the software on the PC that you want to monitor. For LAN monitoring, you need to install the server program to the main computer and install the agent program to client computers. Then you can monitor the remote pcs from the central server.
firstly u need 2...
That depends on the system. Some do, some need to be taught the locations.