What is a sandbox interprocess communication service?

What is a sandbox interprocess communication service?A . A collection of rules within the sandbox that prevent the communication between sandboxes.B . A collection of network services that are activated on an interface, allowing for inter-port communication.C . A collection of interfaces that allow for coordination of activities among processes.D...

March 2, 2022 No Comments READ MORE +

Which event is occurring?

Refer to the exhibit. Which event is occurring?A . A binary named "submit" is running on VM cuckoo1.B . A binary is being submitted to run on VM cuckoo1C . A binary on VM cuckoo1 is being submitted for evaluationD . A URL is being evaluated to see if it...

March 2, 2022 No Comments READ MORE +

Which tool provides a full packet capture from network traffic?

Which tool provides a full packet capture from network traffic?A . NagiosB . CAINEC . HydraD . WiresharkView AnswerAnswer: D

March 2, 2022 No Comments READ MORE +

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?A . Hypertext Transfer ProtocolB . SSL CertificateC . TunnelingD . VPNView AnswerAnswer: B

March 2, 2022 No Comments READ MORE +

A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?

A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?A . post-incident activityB...

March 2, 2022 No Comments READ MORE +

Which regex matches only on all lowercase letters?

Which regex matches only on all lowercase letters?A . [az]+B . [^az]+C . az+D . a*z+View AnswerAnswer: A

March 2, 2022 No Comments READ MORE +

Which type of log is displayed?

Refer to the exhibit. Which type of log is displayed?A . IDSB . proxyC . NetFlowD . sysView AnswerAnswer: D

March 2, 2022 No Comments READ MORE +

What are two social engineering techniques? (Choose two.)

What are two social engineering techniques? (Choose two.)A . privilege escalationB . DDoS attackC . phishingD . man-in-the-middleE . pharmingView AnswerAnswer: C,E

March 1, 2022 No Comments READ MORE +

Which incidence response step includes identifying all hosts affected by an attack?

Which incidence response step includes identifying all hosts affected by an attack?A . detection and analysisB . post-incident activityC . preparationD . containment, eradication, and recoveryView AnswerAnswer: D Explanation:

March 1, 2022 No Comments READ MORE +

How does an attacker observe network traffic exchanged between two users?

How does an attacker observe network traffic exchanged between two users?A . port scanningB . man-in-the-middleC . command injectionD . denial of serviceView AnswerAnswer: B

March 1, 2022 No Comments READ MORE +