6. Which of the following tools can be used to rebuild the contents of a TCP session?
If you answered two or more questions incorrectly, revisit the materials from the lesson Preventing data leaks:
- Tip: Preparing for extrusion detection with a network traffic analysis
- Webcast: Securing your network from the inside out
- Podcast: Fact or fiction: Inside extrusion detection and prevention technology
If you answered four or more questions correctly, return to SearchSecurity.com's Data Protection Security School and begin another lesson, or try another school in SearchSecurity.com's Security School course catalog.