Last Updated on December 11, 2018 by
Which protocol is used by the Cisco Cyberthreat defense solution to collect information about the traffic that is traversing the network select one?Netflow is used by the cisco cyberthreat defense solution to collect information about the traffic that is traversing the network.
What protocol is used to collect information about traffic traversing a network?NetFlow is a protocol used to collect metadata on IP traffic flows traversing a network device. Developed by Cisco Systems, NetFlow is used to record metadata about IP traffic flows traversing a network device such as a router, switch, or host.
Which tools can perform real time traffic and port analysis and can detect port scans fingerprint scans and buffer overflow attacks?Snort is an open source intrusion protection system (IPS) that is capable of performing real-time traffic and port analysis, packet logging, content searching and matching, as well as detecting probes, attacks, port scans, fingerprinting, and buffer overflow attacks.
Which tool can identify malicious traffic by comparing packet contents?A signature-based intrusion detection system (SIDS) monitors all the packets traversing the network and compares them against a database of attack signatures or attributes of known malicious threats, much like antivirus software.
|