Malicious Traffic
During the simulation, how did you identify an SSH brute force attack?
What role did Snort play in detecting malicious activity during the lab exercise?
What key feature of Snort allows it to detect patterns such as SSH brute force attacks?
Which of the following is a common indicator of an SSH brute force attack?
What action should be taken after detecting an SSH brute force attack?
Which of the following security best practices helps prevent SSH brute force attacks?