click below
click below
Normal Size Small Size show me how
Net Def Last SA
| Question | Answer |
|---|---|
| How do cybercriminals make use of a malicious iFrame? | The iFrame allows the browser to load a web page from ANOTHER SOURCE |
| In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks? | HTTPS traffic enables end-to-end encryption. |
| Which network service synchronizes the time across all devices on the network? NTP SNMP NetFlow syslog | NTP |
| Which type of server daemon accepts messages sent by network devices to create a collection of log entries? SSH NTP syslog AAA | syslog |
| What port number would be used if a threat actor was using NTP to direct DDoS attacks? | 123 |
| Which protocol is used to send e-mail messages between two servers that are in different e-mail domains? HTTP POP3 SMTP IMAP4 | SMTP |
| What type of server can threat actors use DNS to communicate with? | CnC |