List of questions
Related questions
Question 13 - 112-51 discussion
George, a certified security professional, was hired by an organization to ensure that the server accurately responds to customer requests. In this process, George employed a security solution to monitor the network traffic toward the server. While monitoring the traffic, he identified attack signatures such as SYN flood and ping of death attempts on the server.
Which of the following categories of suspicious traffic signature has George identified in the above scenario?
A.
Informational
B.
Reconnaissance
C.
Unauthorized access
D.
Denial-of-service (DoS)
Your answer:
0 comments
Sorted by
Leave a comment first