Free II0-001 Exam Braindumps (page: 13)

Page 12 of 58

During a brute force attack, an active trace may be initiated using what tool?

  1. Firewall log
  2. ARP
  3. Traceroute
  4. ARP/Traceroute

Answer(s): A



Many malicious attacks are sourced to ISP dial up accounts, what makes this type of attack source a challenge for an investigator?

  1. Because ISPs refuse to cooperate with investigations
  2. Dial up accounts are too slow for effective countermeasures.
  3. Dial up accounts typically have dynamic IP addresses
  4. Dial up use SLIP not TCP/IP protocol

Answer(s): C



A "listening post" usually refers to:

  1. A sound recording device using in physical security.
  2. Video/audio devices used to record an investigation.
  3. Eavesdropping on electronic communications
  4. An IDS point of presence.

Answer(s): D



During an incident, an incident response team springs into action. What is one of the first steps the team will take?

  1. Contact local law enforcement
  2. Triage of the incident
  3. Determine the source of the attack
  4. Determine the target of the attack

Answer(s): B






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts