What is the threat agent in this situation?

A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property . What is the threat agent in this situation?A . the intellectual property that was stolenB . the defense contractor who stored the intellectual propertyC . the method...

March 4, 2022 No Comments READ MORE +

What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?

What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?A . DAC requires explicit authorization for a given user on a given object, and RBAC requires specific conditions.B . RBAC access is granted when a user meets specific conditions, and in DAC, permissions are applied on...

March 4, 2022 No Comments READ MORE +

Which security principle requires more than one person is required to perform a critical task?

Which security principle requires more than one person is required to perform a critical task?A . least privilegeB . need to knowC . separation of dutiesD . due diligenceView AnswerAnswer: C

March 3, 2022 No Comments READ MORE +

What is a difference between tampered and untampered disk images?

What is a difference between tampered and untampered disk images?A . Tampered images have the same stored and computed hash.B . Untampered images are deliberately altered to preserve as evidence.C . Tampered images are used as evidence.D . Untampered images are used for forensic investigations.View AnswerAnswer: D Explanation: The disk...

March 3, 2022 No Comments READ MORE +

What is a purpose of a vulnerability management framework?

What is a purpose of a vulnerability management framework?A . identifies, removes, and mitigates system vulnerabilitiesB . detects and removes vulnerabilities in source codeC . conducts vulnerability scans on the networkD . manages a list of reported vulnerabilitiesView AnswerAnswer: A

March 3, 2022 No Comments READ MORE +

Which kind of attack method is depicted in this string?

Refer to the exhibit. Which kind of attack method is depicted in this string?A . cross-site scriptingB . man-in-the-middleC . SQL injectionD . denial of serviceView AnswerAnswer: A

March 3, 2022 No Comments READ MORE +

What is the potential threat identified in this Stealthwatch dashboard?

Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?A . Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.B . Host 152.46.6.91 is being identified as a watchlist country for data transfer.C . Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.D...

March 3, 2022 No Comments READ MORE +

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?A . NetScoutB . tcpdumpC . SolarWindsD . netshView AnswerAnswer: B

March 3, 2022 No Comments READ MORE +

What is an advantage of symmetric over asymmetric encryption?

What is an advantage of symmetric over asymmetric encryption?A . A key is generated on demand according to data type.B . A one-time encryption key is generated for data transmissionC . It is suited for transmitting large amounts of data.D . It is a faster encryption mechanism for sessionsView AnswerAnswer:...

March 2, 2022 No Comments READ MORE +

What is causing this issue?

An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN . What is causing this issue?A . incorrect...

March 2, 2022 No Comments READ MORE +