Q1
Which action logs the IP address from a malicious source only and sends an alert?
Options:
A) Reset a TCP connection
B) Drop or prevent the activity
C) Log attacker packets
D) Deny connection inline
E) Request block host
Answer: C) Log attacker packets
1/4
| Term | Definition |
|---|---|
| Q1 Which action logs the IP address from a malicious source only and sends an alert? Options: A) Reset a TCP connection B) Drop or prevent the activity C) Log attacker packets D) Deny connection inline E) Request block host | Answer: C) Log attacker packets |
| Q2 Which action terminates a malicious packet only? Options: A) Reset a TCP connection B) Deny packet inline C) Request block trap D) Request drop host E) Log attacker packets | Answer: B) Deny packet inline |
| Q3 Which action makes the IPS device send TCP resets to hijack and terminate a TCP flow? Options: A) Drop or prevent the activity B) Deny packets inline C) Block future activity D) Reset TCP connection E) Log pair packets | Answer: D) Reset TCP connection |