Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?A . forgery attackB . plaintext-only attackC . ciphertext-only attackD . meet-in-the-middle attackView AnswerAnswer: C

September 21, 2021 No Comments READ MORE +

Which type of evidence supports a theory or an assumption that results from initial evidence?

Which type of evidence supports a theory or an assumption that results from initial evidence?A . probabilisticB . indirectC . bestD . corroborativeView AnswerAnswer: D

September 20, 2021 No Comments READ MORE +

Which two elements in the table are parts of the 5-tuple?

Refer to the exhibit. Which two elements in the table are parts of the 5-tuple? (Choose two.)A . First PacketB . Initiator UserC . Ingress Security ZoneD . Source PortE . Initiator IPView AnswerAnswer: D,E

September 20, 2021 No Comments READ MORE +

What is rule-based detection when compared to statistical detection?

What is rule-based detection when compared to statistical detection?A . proof of a user's identityB . proof of a user's actionC . likelihood of user's actionD . falsification of a user's identityView AnswerAnswer: B

September 20, 2021 No Comments READ MORE +

What does this output indicate?

Refer to the exhibit . What does this output indicate?A . HTTPS ports are open on the server.B . SMB ports are closed on the server.C . FTP ports are open on the server.D . Email ports are closed on the server.View AnswerAnswer: A

September 20, 2021 No Comments READ MORE +

Why is encryption challenging to security monitoring?

Why is encryption challenging to security monitoring?A . Encryption analysis is used by attackers to monitor VPN tunnels.B . Encryption is used by threat actors as a method of evasion and obfuscation.C . Encryption introduces additional processing requirements by the CPE . Encryption introduces larger packet sizes to analyze and...

September 20, 2021 No Comments READ MORE +

Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?

Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?A . resource exhaustionB . tunnelingC . traffic fragmentationD . timing attackView AnswerAnswer: A

September 20, 2021 No Comments READ MORE +

Which type of data collection requires the largest amount of storage space?

Which type of data collection requires the largest amount of storage space?A . alert dataB . transaction dataC . session dataD . full packet captureView AnswerAnswer: D

September 20, 2021 No Comments READ MORE +

Which event is user interaction?

Which event is user interaction?A . gaining root accessB . executing remote codeC . reading and writing file permissionD . opening a malicious fileView AnswerAnswer: D

September 20, 2021 No Comments READ MORE +

What is the difference between the ACK flag and the RST flag in the NetFlow log session?

What is the difference between the ACK flag and the RST flag in the NetFlow log session?A . The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is completeB . The ACK flag confirms the beginning of the...

September 20, 2021 No Comments READ MORE +