- All Exams Instant Download
Which regular expression is needed to capture the IP address 192.168.20.232?
Which regular expression is needed to capture the IP address 192.168.20.232?A . ^ (?:[0-9]{1,3}.){3}[0-9]{1,3}B . ^ (?:[0-9]f1,3}.){1,4}C . ^ (?:[0-9]{1,3}.)'D . ^ ([0-9]-{3})View AnswerAnswer: A
Which kind of evidence is this IP address?
An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise. Which kind of evidence is this IP address?A . best evidenceB . corroborative evidenceC . indirect evidenceD . forensic evidenceView AnswerAnswer: B
Which metric is used to capture the level of access needed to launch a successful attack?
Which metric is used to capture the level of access needed to launch a successful attack?A . privileges requiredB . user interactionC . attack complexityD . attack vectorView AnswerAnswer: A
Which type of evidence is this file?
A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format . Which type of evidence is this file?A . CD data copy prepared in WindowsB . CD data copy prepared in Mac-based systemC . CD data copy prepared in Linux...
How does certificate authority impact a security system?
How does certificate authority impact a security system?A . It authenticates client identity when requesting SSL certificateB . It validates domain identity of a SSL certificateC . It authenticates domain identity when requesting SSL certificateD . It validates client identity when communicating with the serverView AnswerAnswer: B
What is the reason for this discrepancy?
An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack . What is the reason for this discrepancy?A . The computer has a HIPS installed on it.B . The...
What is the difference between a threat and a risk?
What is the difference between a threat and a risk?A . Threat represents a potential danger that could take advantage of a weakness in a systemB . Risk represents the known and identified loss or danger in the systemC . Risk represents the nonintentional interaction with uncertainty in the systemD...
What is a difference between tampered and untampered disk images?
What is a difference between tampered and untampered disk images?A . Tampered images have the same stored and computed hash.B . Untampered images are deliberately altered to preserve as evidence.C . Tampered images are used as evidence.D . Untampered images are used for forensic investigations.View AnswerAnswer: C
How does a certificate authority impact security?
How does a certificate authority impact security?A . It validates client identity when communicating with the server.B . It authenticates client identity when requesting an SSL certificate.C . It authenticates domain identity when requesting an SSL certificate.D . It validates the domain identity of the SSL certificate.View AnswerAnswer: D
Which tool provides a full packet capture from network traffic?
Which tool provides a full packet capture from network traffic?A . NagiosB . CAINEC . HydraD . WiresharkView AnswerAnswer: D