- All Exams Instant Download
What specific type of analysis is assigning values to the scenario to see expected outcomes?
What specific type of analysis is assigning values to the scenario to see expected outcomes?A . deterministicB . exploratoryC . probabilisticD . descriptiveView AnswerAnswer: A Explanation: This type of analysis is deterministic because it assigns fixed values to the scenario and calculates the expected outcomes based on those values. Deterministic...
What does CIA mean in this context?
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?A . confidentiality, identity, and authorizationB . confidentiality, integrity, and authorizationC . confidentiality, identity, and availabilityD . confidentiality, integrity, and availabilityView AnswerAnswer: D Explanation: CIA stands for confidentiality,...
What is the principle of defense-in-depth?
What is the principle of defense-in-depth?A . Agentless and agent-based protection for security are used.B . Several distinct protective layers are involved.C . Access control models are involved.D . Authentication, authorization, and accounting mechanisms are used.View AnswerAnswer: B Explanation: Defense-in-depth is a security strategy where multiple layers of defense are...
What is the difference between the rule-based detection when compared to behavioral detection?
What is the difference between the rule-based detection when compared to behavioral detection?A . Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.B . Rule-Based systems have established patterns that do not change with new data, while behavioral changes.C . Behavioral...
What does the output indicate about the server with the IP address 172.18.104.139?
Refer to the exhibit. What does the output indicate about the server with the IP address 172.18.104.139?A . open ports of a web serverB . open port of an FTP serverC . open ports of an email serverD . running processes of the serverView AnswerAnswer: A Explanation: The output indicates...
What is the difference between the ACK flag and the RST flag in the NetFlow log session?
What is the difference between the ACK flag and the RST flag in the NetFlow log session?A . The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is completeB . The ACK flag confirms the beginning of the...
Which type of log is displayed?
Refer to the exhibit. Which type of log is displayed?A . proxyB . NetFlowC . IDSD . sysView AnswerAnswer: B Explanation: The exhibit shows a log that contains information such as the date, flow start, duration, protocol used, source and destination IP addresses and ports, packets, bytes, and flows. This...
What does cyber attribution identify in an investigation?
What does cyber attribution identify in an investigation?A . cause of an attackB . exploit of an attackC . vulnerabilities exploitedD . threat actors of an attackView AnswerAnswer: D Explanation: Cyber attribution identifies the threat actors of an attack in an investigation. Threat actors are the individuals, groups, organizations, or...
Which two elements in the table are parts of the 5-tuple?
Refer to the exhibit. Which two elements in the table are parts of the 5-tuple? (Choose two.)A . First PacketB . Initiator UserC . Ingress Security ZoneD . Source PortE . Initiator IPView AnswerAnswer: D, E Explanation: The 5-tuple refers to the five different values that are used to define...
What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?
An analyst is exploring the functionality of different operating systems. What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?A . queries Linux devices that have Microsoft Services for Linux installedB . deploys Windows Operating Systems in an automated fashionC . is...