Antivirus/Antimalware
SPAM Filtering
URL Filtering
Blacklisting
Data Loss Prevention (DLP)
Type of modern skill teenagers and inexperienced hackers running scripts, tools, and exploits to cause harm but typically not for profit.
A malicious code that is attached to executable files which are often legitimate programs.
A network administrator needs to protect a router against brute force login attempts. What is the correct login-block-for command syntax to disable login for 3 minutes if more than 3 failed attempts are made within a 2 minute period?
A. login block-for 180 attempts 120 within 3
B. login block-for 3 attempts 120 within 3
C. login block-for 3 attempts 3 within 2
D. login block-for 180 attempts 3 within 120
Which command helps verify the Cisco IOS IPS configuration?
A. Router# show ip ips configuration
B. Router# show ip ips statistics
C.Router# show ip ips sessions
D.Router# show ip ips signatures
Enabling traffic from one VLAN to be seen by another VLAN is the goal of a VLAN ______________ attack.