18. What does tcpdump do?
- Handles packet injection
- Brute forces password databases
- Generates DDoS attack traffic
- Performs packet capture and analysis
19. What can protect your network from DoS attacks?
- DHCP Snooping
- Dynamic ARP Inspection
- Flood Guard
- IP Source Guard
20. What occurs after a Network Intrusion Detection System (NIDS) first detects an attack?
- Triggers alerts
- Shuts down
- Blocks traffic
- Disables network access
21. What does a Network Intrusion Prevention System (NIPS) do when it detects an attack?
- It blocks the traffic.
- It does nothing.
- It triggers an alert.
- It attacks back.
22. How do you protect against rogue DHCP server attacks?
- IP Source Guard
- Flood Guard
- Dynamic ARP Inspection
- DHCP Snooping
24. What traffic would an implicit deny firewall rule block?
- Outbound traffic only
- Nothing unless blocked
- Everything that is not explicitly permitted or allowed
- Inbound traffic only
25. What allows you to take all packets from a specified port, port range, or an entire VLAN and mirror the packets to a specified switch port?
- DHCP Snooping
- Promiscuous Mode
- Network hub
- Port Mirroring
26. What kind of attack does IP Source Guard (IPSG) protect against?
- IP Spoofing attacks
- DoS attacks
- ARP Man-in-the-middle attacks
- Rogue DHCP Server attacks
27. What can be configured to allow secure remote connections to web applications without requiring a VPN?
- Reverse proxy
- RC4
- NIDS
- Web browser
27. What can be configured to allow secure remote connections to web applications without requiring a VPN?
- Reverse proxy
- RC4
- NIDS
- Web browser