
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 89 -
Given the following signature engines, which would represent the most appropriate
choice when creating a intruder detecting signature that scans for open port number 80
using stealth scanning techniques?
A. ATOMIC.TCP
B. SERVICE.TCP.HTTP
C. ATOMIC.IPORTIONS
D. SERVICE.HTTP
Answer: A
Explanation:
Reference:
Cisco Courseware 13-34
QUESTION NO: 4
Which of the following signature descriptions best describes a service signature engine?
A. Inspects multiple transport protocols.
B. Detects network reconnaissance.
C. Protocol analysis for layers 5, 6, and 7 applications.
D. Identifies traffic irregularities.
Comentarios a estos manuales