W[^t is vulnerability management?

W[^t is vulnerability management?A . A security practice focused on clarifying and narrowing intrusion points.B . A security practice of performing actions rather than acknowledging the threats.C . A process to identify and remediate existing weaknesses.D . A process to recover from service interruptions and restore business-critical applicationsView AnswerAnswer: C

September 17, 2021No CommentsREAD MORE +

Who performs the attack?

A security incident occurred with the potential of impacting business services. Who performs the attack?A . malware authorB . threat actorC . bug bounty hunterD . direct competitorView AnswerAnswer: A

September 17, 2021No CommentsREAD MORE +

Which regular expression matches "color" and "colour"?

Which regular expression matches "color" and "colour"?A . colo?urB . col[08]+ourC . colou?rD . col[09]+ourView AnswerAnswer: C

September 16, 2021No CommentsREAD MORE +

How does an SSL certificate impact security between the client and the server?

How does an SSL certificate impact security between the client and the server?A . by enabling an authenticated channel between the client and the serverB . by creating an integrated channel between the client and the serverC . by enabling an authorized channel between the client and the serverD ....

September 16, 2021No CommentsREAD MORE +

When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?

When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?A . fragmentationB . pivotingC . encryptionD . stenographyView AnswerAnswer: C Explanation: https://techdifferences.com/difference-between-steganography-and-cryptography.html#:~:text=The%20steganography%20and%20cryptography%20are,the%2 0structure%20of%20the%20message.

September 16, 2021No CommentsREAD MORE +

Which event artifact is used to identify HTTP GET requests for a specific file?

Which event artifact is used to identify HTTP GET requests for a specific file?A . destination IP addressB . TCP ACKC . HTTP status codeD . URIView AnswerAnswer: D

September 16, 2021No CommentsREAD MORE +

Which component is identifiable in this exhibit?

Refer to the exhibit. Which component is identifiable in this exhibit?A . Trusted Root Certificate store on the local machineB . Windows PowerShell verbC . Windows Registry hiveD . local service in the Windows Services ManagerView AnswerAnswer: C

September 16, 2021No CommentsREAD MORE +

What is personally identifiable information that must be safeguarded from unauthorized access?

What is personally identifiable information that must be safeguarded from unauthorized access?A . date of birthB . driver's license numberC . genderD . zip codeView AnswerAnswer: B

September 16, 2021No CommentsREAD MORE +

What is a difference between tampered and untampered disk images?

What is a difference between tampered and untampered disk images?A . Tampered images have the same stored and computed hash.B . Tampered images are used as evidence.C . Untampered images are used for forensic investigations.D . Untampered images are deliberately altered to preserve as evidenceView AnswerAnswer: B

September 15, 2021No CommentsREAD MORE +

Which process is used when IPS events are removed to improve data integrity?

Which process is used when IPS events are removed to improve data integrity?A . data availabilityB . data normalizationC . data signatureD . data protectionView AnswerAnswer: B

September 15, 2021No CommentsREAD MORE +