When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?

When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?A . fragmentationB . pivotingC . encryptionD . stenographyView AnswerAnswer: C Explanation: https://techdifferences.com/difference-between-steganography-and-cryptography.html#:~:text=The%20steganography%20and%20cryptography%20are,the%20structure %20of%20the%20message.

February 12, 2024No CommentsREAD MORE +

What is a benefit of agent-based protection when compared to agentless protection?

What is a benefit of agent-based protection when compared to agentless protection?A . It lowers maintenance costsB . It provides a centralized platformC . It collects and detects all traffic locallyD . It manages numerous devices simultaneouslyView AnswerAnswer: C Explanation: Host-based antivirus protection is also known as agent-based. Agent-based antivirus...

February 12, 2024No CommentsREAD MORE +

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?A . NetScoutB . tcpdumpC . SolarWindsD . netshView AnswerAnswer: B

February 12, 2024No CommentsREAD MORE +

Which identifier tracks an active program?

A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?A . application identification numberB . active process identification numberC . runtime identification numberD . process identification numberView AnswerAnswer: D

February 12, 2024No CommentsREAD MORE +

What information is depicted?

Refer to the exhibit. What information is depicted?A . IIS dataB . NetFlow dataC . network discovery eventD . IPS event dataView AnswerAnswer: B

February 12, 2024No CommentsREAD MORE +

What does the message indicate?

Refer to the exhibit. What does the message indicate?A . an access attempt was made from the Mosaic web browserB . a successful access attempt was made to retrieve the password fileC . a successful access attempt was made to retrieve the root of the websiteD . a denied access...

February 11, 2024No CommentsREAD MORE +

Which two components reduce the attack surface on an endpoint? (Choose two.)

Which two components reduce the attack surface on an endpoint? (Choose two.)A . secure bootB . load balancingC . increased audit log levelsD . restricting USB portsE . full packet captures at the endpointView AnswerAnswer: AD

February 11, 2024No CommentsREAD MORE +

What causes events on a Windows system to show Event Code 4625 in the log messages?

What causes events on a Windows system to show Event Code 4625 in the log messages?A . The system detected an XSS attackB . Someone is trying a brute force attack on the networkC . Another device is gaining root access to the systemD . A privileged user successfully logged...

February 11, 2024No CommentsREAD MORE +

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?A . Hypertext Transfer ProtocolB . SSL CertificateC . TunnelingD . VPNView AnswerAnswer: B

February 11, 2024No CommentsREAD MORE +

What does CIA mean in this context?

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?A . confidentiality, identity, and authorizationB . confidentiality, integrity, and authorizationC . confidentiality, identity, and availabilityD . confidentiality, integrity, and availabilityView AnswerAnswer: D

February 11, 2024No CommentsREAD MORE +