What is a sandbox interprocess communication service?
What is a sandbox interprocess communication service?A . A collection of rules within the sandbox that prevent the communication between sandboxes.B . A collection of network services that are activated on an interface, allowing for inter-port communication.C . A collection of interfaces that allow for coordination of activities among processes.D...
Which event is occurring?
Refer to the exhibit. Which event is occurring?A . A binary named "submit" is running on VM cuckoo1.B . A binary is being submitted to run on VM cuckoo1C . A binary on VM cuckoo1 is being submitted for evaluationD . A URL is being evaluated to see if it...
Which tool provides a full packet capture from network traffic?
Which tool provides a full packet capture from network traffic?A . NagiosB . CAINEC . HydraD . WiresharkView AnswerAnswer: D
Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?
Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?A . Hypertext Transfer ProtocolB . SSL CertificateC . TunnelingD . VPNView AnswerAnswer: B
A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?
A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?A . post-incident activityB...
Which regex matches only on all lowercase letters?
Which regex matches only on all lowercase letters?A . [az]+B . [^az]+C . az+D . a*z+View AnswerAnswer: A
Which type of log is displayed?
Refer to the exhibit. Which type of log is displayed?A . IDSB . proxyC . NetFlowD . sysView AnswerAnswer: D
What are two social engineering techniques? (Choose two.)
What are two social engineering techniques? (Choose two.)A . privilege escalationB . DDoS attackC . phishingD . man-in-the-middleE . pharmingView AnswerAnswer: C,E
Which incidence response step includes identifying all hosts affected by an attack?
Which incidence response step includes identifying all hosts affected by an attack?A . detection and analysisB . post-incident activityC . preparationD . containment, eradication, and recoveryView AnswerAnswer: D Explanation:
How does an attacker observe network traffic exchanged between two users?
How does an attacker observe network traffic exchanged between two users?A . port scanningB . man-in-the-middleC . command injectionD . denial of serviceView AnswerAnswer: B