- All Exams Instant Download
What is the virtual address space for a Windows process?
What is the virtual address space for a Windows process?A . physical location of an object in memoryB . set of pages that reside in the physical memoryC . system-level memory protection feature built into the operating systemD . set of virtual memory addresses that can be usedView AnswerAnswer: D...
What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?
What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?A . least privilegeB . need to knowC . integrity validationD . due diligenceView AnswerAnswer: A Explanation: The principle of least privilege states that users and processes should be granted only the...
Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?
Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?A . Hypertext Transfer ProtocolB . SSL CertificateC . TunnelingD . VPNView AnswerAnswer: B Explanation: SSL Certificate guarantees the integrity and authenticity of all messages transferred to and from a web application. It...
Which category classifies the intrusion?
A user received a malicious attachment but did not run it. Which category classifies the intrusion?A . weaponizationB . reconnaissanceC . installationD . deliveryView AnswerAnswer: D
Which metric is used to capture the level of access needed to launch a successful attack?
Which metric is used to capture the level of access needed to launch a successful attack?A . privileges requiredB . user interactionC . attack complexityD . attack vectorView AnswerAnswer: A Explanation: Privileges required is a metric in the Common Vulnerability Scoring System (CVSS) that measures the level of access needed...
Which step in the incident response process researches an attacking host through logs in a SIEM?
Which step in the incident response process researches an attacking host through logs in a SIEM?A . detection and analysisB . preparationC . eradicationD . containmentView AnswerAnswer: A Explanation: In the incident response process, detection and analysis involve researching an attacking host through logs in a Security Information and Event...
Which security monitoring data type requires the largest storage space?
Which security monitoring data type requires the largest storage space?A . transaction dataB . statistical dataC . session dataD . full packet captureView AnswerAnswer: D Explanation: Full packet capture data involves storing the entire content of packets that traverse a network. This type of data is comprehensive and allows for...
How does certificate authority impact a security system?
How does certificate authority impact a security system?A . It authenticates client identity when requesting SSL certificateB . It validates domain identity of a SSL certificateC . It authenticates domain identity when requesting SSL certificateD . It validates client identity when communicating with the serverView AnswerAnswer: B Explanation: A Certificate...
What is an attack surface as compared to a vulnerability?
What is an attack surface as compared to a vulnerability?A . any potential danger to an assetB . the sum of all paths for data into and out of the environmentC . an exploitable weakness in a system or its designD . the individuals who perform an attackView AnswerAnswer: B...
What should be interpreted from this packet capture?
Refer to the exhibit. What should be interpreted from this packet capture?A . 81.179.179.69 is sending a packet from port 80 to port 50272 of IP address 192.168.122.100 using UDP protocol.B . 192.168.122.100 is sending a packet from port 50272 to port 80 of IP address 81.179.179.69 using TCP protocol.C...