Question: 1
Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?
Question: 2
In which of the following types of port scans does the scanner attempt to connect to all 65,535 ports?
Question: 3
Which of the following is a firewall that keeps track of the state of network connections traveling across it?
Question: 4
Which of the following can be performed with software or hardware devices in order to record everything a person types using his keyboard?
Question: 5
Which of the following tools is a free laptop tracker that helps in tracking a user's laptop in case it gets stolen?