Your network is going to implement a new network security solution, and as part of this you are configuring IPSec on a Windows Server 2003 machine. Which of the following is the description of the Client (Respond Only) default IPSec Policy?
You have recently been contracted to implement a new firewall solution at a client site. What are the two basic forms of firewall implementations?
You have just installed a new ISA Server 2006, and are monitoring the new deployment. In the Monitoring Details pane, which tab will provide you with visual displays of current monitoring information?
You are reviewing the IDS logs and during your analysis you notice a user account that had attempted to log on to your network ten times one night between 3 and 4 AM. This is quite different from the normal pattern of this user account, as this user is only in the office from 8AM to 6PM. Had your IDS detected this anomaly, which of the following types of detection best describes this event?
When performing wireless network traffic analysis, what is the type and subtype for an 802.11 authentication packet?