6. Which of the following tools can be used to rebuild the contents of a TCP session?
If you answered two or more questions incorrectly, revisit the materials from the
lesson Preventing data
- Tip: Preparing
for extrusion detection with a network traffic analysis
- Webcast: Securing your
network from the inside out
- Podcast: Fact or fiction:
Inside extrusion detection and prevention technology
If you answered four or more questions correctly, return to SearchSecurity.com's Data Protection Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.
This was first published in May 2007