A tool that continually monitors network traffic
What is a Network Monitor
Contains recorded conditions recognized by operating system
What is a Log
She is the technical analyst of the Behavioral Analysis Unit on the show criminal minds.
what is Penelope Garcia
A program that is designed only to read Hyper Text Markup Language web pages downloaded from Internet websites.
What is a browser or web browser?
traffic sent to any port on a switch can be sent to a mirrored port.
What is port mirroring?
Application to view log information in Windows
What is an Event Viewer Application
He plans and finds people to do heists and keeps it well hidden.
Who is Lester Crest?
Refers to a system that functions reliably nearly all the time
What is high availability
running monitoring software on a computer connected wirelessly to the network, is what type of monitoring?
wireless
The most secure version of the SNMP protocol
What is SNMPv3
The cyber intelligence specialist in the live action film G-Force who is the hidden main antagonist
Who is Speckles the mole?
when someone makes a fake website and fake email address to try and steal people's personal information.
a tool that can monitor traffic at a specific interface between a server or client and the network.
protocol analyzer
standard for generating, storing, and processing messages about events on Linux or UNIX
what is the Syslog function?
He made a peer-to-peer file-sharing service that allowed people to download songs that were previously recorded.
The Napster.
People who try to gain access to computers remotely to learn more information.
Who is a hacker?
The installation of a device, called a network TAP (test access point) or packet sniffer, in line with network traffic, is what type of monitoring.
in-line monitoring
This utility is responsible for generating, storing and processing events on a system.
What is a system log?
The technology specialist and former computer intelligence consultant who leaked highly classified information from the National Security Agency
Who is Edward Snowden
There are 3 elements of cybersecurity confidentiality, availability, and...
What is integrity?