- All Exams Instant Download
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?A . fragmentationB . pivotingC . encryptionD . stenographyView AnswerAnswer: C Explanation: https://techdifferences.com/difference-between-steganography-and-cryptography.html#:~:text=The%20steganography%20and%20cryptography%20are,the%20structure %20of%20the%20message.
What is a benefit of agent-based protection when compared to agentless protection?
What is a benefit of agent-based protection when compared to agentless protection?A . It lowers maintenance costsB . It provides a centralized platformC . It collects and detects all traffic locallyD . It manages numerous devices simultaneouslyView AnswerAnswer: C Explanation: Host-based antivirus protection is also known as agent-based. Agent-based antivirus...
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?A . NetScoutB . tcpdumpC . SolarWindsD . netshView AnswerAnswer: B
Which identifier tracks an active program?
A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?A . application identification numberB . active process identification numberC . runtime identification numberD . process identification numberView AnswerAnswer: D
What information is depicted?
Refer to the exhibit. What information is depicted?A . IIS dataB . NetFlow dataC . network discovery eventD . IPS event dataView AnswerAnswer: B
What does the message indicate?
Refer to the exhibit. What does the message indicate?A . an access attempt was made from the Mosaic web browserB . a successful access attempt was made to retrieve the password fileC . a successful access attempt was made to retrieve the root of the websiteD . a denied access...
Which two components reduce the attack surface on an endpoint? (Choose two.)
Which two components reduce the attack surface on an endpoint? (Choose two.)A . secure bootB . load balancingC . increased audit log levelsD . restricting USB portsE . full packet captures at the endpointView AnswerAnswer: AD
What causes events on a Windows system to show Event Code 4625 in the log messages?
What causes events on a Windows system to show Event Code 4625 in the log messages?A . The system detected an XSS attackB . Someone is trying a brute force attack on the networkC . Another device is gaining root access to the systemD . A privileged user successfully logged...
Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?
Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?A . Hypertext Transfer ProtocolB . SSL CertificateC . TunnelingD . VPNView AnswerAnswer: B
What does CIA mean in this context?
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?A . confidentiality, identity, and authorizationB . confidentiality, integrity, and authorizationC . confidentiality, identity, and availabilityD . confidentiality, integrity, and availabilityView AnswerAnswer: D