Q1
Which action logs the IP address from a malicious source only and sends an alert?
Options:
A) Reset a TCP connection
B) Drop or prevent the activity
C) Log attacker packets
D) Deny connection inline
E) Request block host
Answer: C) Log attacker packets
1/4
| Term | Definition |
|---|---|
Q1
Which action logs the IP address from a malicious source only and sends an alert?
Options:
A) Reset a TCP connection
B) Drop or prevent the activity
C) Log attacker packets
D) Deny connection inline
E) Request block host
|
Answer: C) Log attacker packets |
Q2
Which action terminates a malicious packet only?
Options:
A) Reset a TCP connection
B) Deny packet inline
C) Request block trap
D) Request drop host
E) Log attacker packets | Answer: B) Deny packet inline |
Q3
Which action makes the IPS device send TCP resets to hijack and terminate a TCP flow?
Options:
A) Drop or prevent the activity
B) Deny packets inline
C) Block future activity
D) Reset TCP connection
E) Log pair packets | Answer: D) Reset TCP connection |