Question

A network interface found in a promiscuous mode on an enterprise network would NOT be considered...

  1. A network interface found in a promiscuous mode on an enterprise network would NOT be considered a possible symptom of system compromise.

True

False


  1. What is wrong with the system activity in this image?

The notepad application is running with system level privileges.

Notepad.exe is running ahead of svchost.exe

notepad.exe is too large (2444 MBs)

notepad.exe is running out of the system32 folder

  1. What is the Gold Disk?

Something The Beatles have too many of.

A desktop deployment standard with all of the same programs, services, and baseline features installed for continuity.

A set of server backups placed on a high capacity optical disk

A compilation of patches, fixes, and security controls that can be run on the host machine in order to advert network traffic congestion.

  1. Host-Based monitoring will alert on all of the following except:

Changes to the system registry

Kernel changes

Zero-day browser exploits

falied login attempts

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hey here is answer to your question.

1. False , because promiscuous mode allow to capture the network packets which is not intended for network interface.

2. notepad.exe is too large (2444 MBs) as its relatively small file in real life.

3. A desktop deployment standard with all of the same programs, services, and baseline features installed for continuity.

4.falied login attempts

In case of any doubt please comment. Happy Learning :)

Add a comment
Know the answer?
Add Answer to:
A network interface found in a promiscuous mode on an enterprise network would NOT be considered...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT