From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Threat assessment: Q&A

Threat assessment: Q&A

From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review

Start my 1-month free trial

Threat assessment: Q&A

- [Instructor] Here's a question that will test your knowledge of threat assessment. (door banging) You're concerned that an intruder might be active on your network and you'd like to monitor network traffic for signs of their activity. You want to use a passive tool to avoid tipping off the intruder to your presence. What tool would be the most appropriate for this task? Would you use a protocol analyzer? A vulnerability scanner? A honeypot? Or a honeynet? (air whooshing) Let me repeat that question for you. You're concerned that an intruder might be active on your network and you'd like to monitor network traffic for signs of their activity. You want to use a passive tool to avoid tipping off the intruder to your presence. What tool would be most appropriate for this task? Would you use a protocol analyzer? A vulnerability scanner? A honeypot or a honeynet? (air whooshing) (clock ticking) (bell…

Contents