..In the example shown, Host A has attempted a DCOM attack using Metasploit from Host A to Host.

In the example shown, Host A has attempted a DCOM attack using Metasploit from Host A to Host

In the example shown, Host A has attempted a DCOM attack using Metasploit from Host A to Host

A.
Which three statements best describe how event logs and IPS alerts can be used in conjunction with each other to determine if the attack was successful? (Choose three.)

B.
Cisco Security MARS will collect the syslog and the IPS alerts based on time.

C.
The IPS event will suggest that an attack may have occurred because a signature was triggered.

D.
IPS and Cisco ASA adaptive security appliance will use the Unified Threat Management protocol to determine that both devices saw the attack

E.
Cisco ASA adaptive security appliance will see the attack in both directions and will be able to determine if an attack was successful.

F.
The syslog event will indicate that an attack is likely because a TCP SYN and an ACK followed the attempted attack.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


rohit

rohit

Option-A is part of the question, so the answer to this question will be option B,C and F……