ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 21 - 112-51 discussion

Report
Export

Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?

A.
Reconnaissance signatures
Answers
A.
Reconnaissance signatures
B.
Unauthorized access signatures
Answers
B.
Unauthorized access signatures
C.
Denial-of-service (DoS) signatures
Answers
C.
Denial-of-service (DoS) signatures
D.
Informational signatures
Answers
D.
Informational signatures
Suggested answer: B

Explanation:

Unauthorized access signatures were identified by Kalley through the installed monitoring system. Unauthorized access signatures are designed to detect attempts to gain unauthorized access to a system or network by exploiting vulnerabilities, misconfigurations, or weak credentials. Password cracking, sniffing, and brute-forcing are common techniques used by attackers to obtain or guess the passwords of legitimate users or administrators and gain access to their accounts or privileges. These techniques generate suspicious traffic patterns that can be detected by traffic monitoring systems, such as Snort, using signature-based detection. Signature-based detection is based on the premise that abnormal or malicious network traffic fits a distinct pattern, whereas normal or benign traffic does not. Therefore, by installing a traffic monitoring system and capturing and reporting suspicious traffic signatures, Kalley can identify and prevent unauthorized access attempts and protect the security of her organization's network.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-33 to 3-34

Detecting Suspicious Traffic via Signatures - Intrusion Detection with Snort, O'Reilly, 2003

Threat Signature Categories - Palo Alto Networks, Palo Alto Networks, 2020

asked 18/09/2024
Frank Acosta
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first