ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 39 - 112-51 discussion

Report
Export

Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Identify the attack signature analysis technique performed by Joseph in the above scenario.

A.
Composite-signature-based analysis
Answers
A.
Composite-signature-based analysis
B.
Context-based signature analysis
Answers
B.
Context-based signature analysis
C.
Content-based signature analysis
Answers
C.
Content-based signature analysis
D.
Atomic-signature-based analysis
Answers
D.
Atomic-signature-based analysis
Suggested answer: D

Explanation:

Atomic-signature-based analysis is a type of attack signature analysis technique that uses a single characteristic or attribute of a packet header to identify malicious traffic. Atomic signatures are simple and fast to match, but they can also generate false positives or miss some attacks. Some examples of atomic signatures are source and destination IP addresses, port numbers, protocol types, and TCP flags. Atomic-signature-based analysis is the technique performed by Joseph in the above scenario, as he analyzed packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Reference:

[Understanding the Network Traffic Signatures] - Module 12: Network Traffic Monitoring

Network Defense Essentials (NDE) | Coursera - Week 12: Network Traffic Monitoring

[Network Defense Essentials Module 12 (Network Traffic Monitoring) - Quizlet] - Flashcards: What are Network Traffic Signatures?

asked 18/09/2024
frederic dohen
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first