System Administrator 2026
What is the purpose of a shadow honeypot?
- A. To flag attacks against known vulnerabilities
- B. To help reduce false positives in a signature-based ids
- C. To randomly check suspicious traffic identified by an anomaly detection system
- D. To enhance the accuracy of a traditional honeypot
Which of the following is true of signature-based IDSes?
- A. They alert administrators to deviations from ?normal” traffic behavior
- B. They identify previously unknown attacks
- C. The technology is mature and reliable enough to use on production networks
- D. They scan network traffic or packets to identify matches with attack-definition files
The PPP protocol _________
- A. Is designed for simple links which transport packets between two peers
- B. Is one of the protocols for making an internet connection over a phone line
- C. Is designed for simple links which transport packets between two peers and making an internet connection over a phone line
- D. Is used for sharing bandwidth