What is the threat agent in this situation?
A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property . What is the threat agent in this situation?A . the intellectual property that was stolenB . the defense contractor who stored the intellectual propertyC . the method...
What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?
What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?A . DAC requires explicit authorization for a given user on a given object, and RBAC requires specific conditions.B . RBAC access is granted when a user meets specific conditions, and in DAC, permissions are applied on...
Which security principle requires more than one person is required to perform a critical task?
Which security principle requires more than one person is required to perform a critical task?A . least privilegeB . need to knowC . separation of dutiesD . due diligenceView AnswerAnswer: C
What is a difference between tampered and untampered disk images?
What is a difference between tampered and untampered disk images?A . Tampered images have the same stored and computed hash.B . Untampered images are deliberately altered to preserve as evidence.C . Tampered images are used as evidence.D . Untampered images are used for forensic investigations.View AnswerAnswer: D Explanation: The disk...
What is a purpose of a vulnerability management framework?
What is a purpose of a vulnerability management framework?A . identifies, removes, and mitigates system vulnerabilitiesB . detects and removes vulnerabilities in source codeC . conducts vulnerability scans on the networkD . manages a list of reported vulnerabilitiesView AnswerAnswer: A
Which kind of attack method is depicted in this string?
Refer to the exhibit. Which kind of attack method is depicted in this string?A . cross-site scriptingB . man-in-the-middleC . SQL injectionD . denial of serviceView AnswerAnswer: A
What is the potential threat identified in this Stealthwatch dashboard?
Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?A . Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.B . Host 152.46.6.91 is being identified as a watchlist country for data transfer.C . Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.D...
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?A . NetScoutB . tcpdumpC . SolarWindsD . netshView AnswerAnswer: B
What is an advantage of symmetric over asymmetric encryption?
What is an advantage of symmetric over asymmetric encryption?A . A key is generated on demand according to data type.B . A one-time encryption key is generated for data transmissionC . It is suited for transmitting large amounts of data.D . It is a faster encryption mechanism for sessionsView AnswerAnswer:...
What is causing this issue?
An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN . What is causing this issue?A . incorrect...