- All Exams Instant Download
W[^t is vulnerability management?
W[^t is vulnerability management?A . A security practice focused on clarifying and narrowing intrusion points.B . A security practice of performing actions rather than acknowledging the threats.C . A process to identify and remediate existing weaknesses.D . A process to recover from service interruptions and restore business-critical applicationsView AnswerAnswer: C
Who performs the attack?
A security incident occurred with the potential of impacting business services. Who performs the attack?A . malware authorB . threat actorC . bug bounty hunterD . direct competitorView AnswerAnswer: A
Which regular expression matches "color" and "colour"?
Which regular expression matches "color" and "colour"?A . colo?urB . col[08]+ourC . colou?rD . col[09]+ourView AnswerAnswer: C
How does an SSL certificate impact security between the client and the server?
How does an SSL certificate impact security between the client and the server?A . by enabling an authenticated channel between the client and the serverB . by creating an integrated channel between the client and the serverC . by enabling an authorized channel between the client and the serverD ....
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?A . fragmentationB . pivotingC . encryptionD . stenographyView AnswerAnswer: C Explanation: https://techdifferences.com/difference-between-steganography-and-cryptography.html#:~:text=The%20steganography%20and%20cryptography%20are,the%2 0structure%20of%20the%20message.
Which event artifact is used to identify HTTP GET requests for a specific file?
Which event artifact is used to identify HTTP GET requests for a specific file?A . destination IP addressB . TCP ACKC . HTTP status codeD . URIView AnswerAnswer: D
Which component is identifiable in this exhibit?
Refer to the exhibit. Which component is identifiable in this exhibit?A . Trusted Root Certificate store on the local machineB . Windows PowerShell verbC . Windows Registry hiveD . local service in the Windows Services ManagerView AnswerAnswer: C
What is personally identifiable information that must be safeguarded from unauthorized access?
What is personally identifiable information that must be safeguarded from unauthorized access?A . date of birthB . driver's license numberC . genderD . zip codeView AnswerAnswer: B
What is a difference between tampered and untampered disk images?
What is a difference between tampered and untampered disk images?A . Tampered images have the same stored and computed hash.B . Tampered images are used as evidence.C . Untampered images are used for forensic investigations.D . Untampered images are deliberately altered to preserve as evidenceView AnswerAnswer: B
Which process is used when IPS events are removed to improve data integrity?
Which process is used when IPS events are removed to improve data integrity?A . data availabilityB . data normalizationC . data signatureD . data protectionView AnswerAnswer: B