What is the name of the instrument pictured below? • Question 34 What does a Throughput Tester do? • Question 35 Which of the approaches is used to determine the password of a system account or a user account? (Choose 2) • Question 36 Which of the following is NOT an example of an integrity violation? • Question 37 Which of the following is a firewall device type? (Choose 2) • Question 38 What type of integrity attack is described in the diagram below? • Question 39 What are the three primary goals of network security? • Question 40 What are the three types of malicious traffic detection methods? • Question 41 What type of availability attack is described in the diagram below?