Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?
Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?A . forgery attackB . plaintext-only attackC . ciphertext-only attackD . meet-in-the-middle attackView AnswerAnswer: C
Which type of evidence supports a theory or an assumption that results from initial evidence?
Which type of evidence supports a theory or an assumption that results from initial evidence?A . probabilisticB . indirectC . bestD . corroborativeView AnswerAnswer: D
Which two elements in the table are parts of the 5-tuple?
Refer to the exhibit. Which two elements in the table are parts of the 5-tuple? (Choose two.)A . First PacketB . Initiator UserC . Ingress Security ZoneD . Source PortE . Initiator IPView AnswerAnswer: D,E
What is rule-based detection when compared to statistical detection?
What is rule-based detection when compared to statistical detection?A . proof of a user's identityB . proof of a user's actionC . likelihood of user's actionD . falsification of a user's identityView AnswerAnswer: B
What does this output indicate?
Refer to the exhibit . What does this output indicate?A . HTTPS ports are open on the server.B . SMB ports are closed on the server.C . FTP ports are open on the server.D . Email ports are closed on the server.View AnswerAnswer: A
Why is encryption challenging to security monitoring?
Why is encryption challenging to security monitoring?A . Encryption analysis is used by attackers to monitor VPN tunnels.B . Encryption is used by threat actors as a method of evasion and obfuscation.C . Encryption introduces additional processing requirements by the CPE . Encryption introduces larger packet sizes to analyze and...
Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?
Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?A . resource exhaustionB . tunnelingC . traffic fragmentationD . timing attackView AnswerAnswer: A
Which type of data collection requires the largest amount of storage space?
Which type of data collection requires the largest amount of storage space?A . alert dataB . transaction dataC . session dataD . full packet captureView AnswerAnswer: D
Which event is user interaction?
Which event is user interaction?A . gaining root accessB . executing remote codeC . reading and writing file permissionD . opening a malicious fileView AnswerAnswer: D
What is the difference between the ACK flag and the RST flag in the NetFlow log session?
What is the difference between the ACK flag and the RST flag in the NetFlow log session?A . The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is completeB . The ACK flag confirms the beginning of the...