Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?A . known-plaintextB . replayC . dictionaryD . man-in-the-middleView AnswerAnswer: D
What is the relationship between a vulnerability and a threat?
What is the relationship between a vulnerability and a threat?A . A threat exploits a vulnerabilityB . A vulnerability is a calculation of the potential loss caused by a threatC . A vulnerability exploits a threatD . A threat is a calculation of the potential loss caused by a vulnerabilityView...
Which type of data consists of connection level, application-specific records generated from network traffic?
Which type of data consists of connection level, application-specific records generated from network traffic?A . transaction dataB . location dataC . statistical dataD . alert dataView AnswerAnswer: A
What is a difference between SOAR and SIEM?
What is a difference between SOAR and SIEM?A . SOAR platforms are used for threat and vulnerability management, but SIEM applications are notB . SIEM applications are used for threat and vulnerability management, but SOAR platforms are notC . SOAR receives information from a single platform and delivers it to...
Which security technology allows only a set of pre-approved applications to run on a system?
Which security technology allows only a set of pre-approved applications to run on a system?A . application-level blacklistingB . host-based IPSC . application-level whitelistingD . antivirusView AnswerAnswer: C
What is a purpose of a vulnerability management framework?
What is a purpose of a vulnerability management framework?A . identifies, removes, and mitigates system vulnerabilitiesB . detects and removes vulnerabilities in source codeC . conducts vulnerability scans on the networkD . manages a list of reported vulnerabilitiesView AnswerAnswer: A
What is the threat agent in this situation?
A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?A . the intellectual property that was stolenB . the defense contractor who stored the intellectual propertyC . the method used...
Drag and drop the technology on the left onto the data type the technology provides on the right
DRAG DROP Drag and drop the technology on the left onto the data type the technology provides on the right. View AnswerAnswer:
Which type of log is displayed?
Refer to the exhibit. Which type of log is displayed?A . proxyB . NetFlowC . IDSD . sysView AnswerAnswer: B
Which metric is used to capture the level of access needed to launch a successful attack?
Which metric is used to capture the level of access needed to launch a successful attack?A . privileges requiredB . user interactionC . attack complexityD . attack vectorView AnswerAnswer: D Explanation: Attack Vector (AV) represents the level of access an attacker needs to have to exploit a vulnerability. It can...