Free II0-001 Exam Braindumps (page: 6)

Page 5 of 58

Stream comparison used as a Traceback technique focuses on what two factors?

  1. the IP address and victim port
  2. the packet contents and audit logs
  3. inter-packet timing and the victim port
  4. the packet contents and inter-packet timing

Answer(s): D



To perform a successful traceback, the two most prominent problems that need to be solved are locating the source of IP packets and:

  1. the timestamp of the event
  2. determining the first node of a connection chain
  3. the reflector host
  4. the victim port

Answer(s): B



The most important network information that should be observed from the logs during a Traceback is the intruder IP address, the victim IP address, the victim port, protocol information and the:

  1. source port
  2. operating system
  3. MAC address
  4. timestamp

Answer(s): D



A new protocol that is designed to aid in intrusion protection and IP tracebacks is known as:

  1. Intruder Detection and Isolation Protocol (IDIP)
  2. Intrusion Detection and Traceback Protocol (IDTP)
  3. Facilitating Traceback Protocol (FTP)
  4. Intruder Detection and Internet Protocol (IDIP)

Answer(s): A






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts