Which regular expression is needed to capture the IP address 192.168.20.232?

Which regular expression is needed to capture the IP address 192.168.20.232?A . ^ (?:[0-9]{1,3}.){3}[0-9]{1,3}B . ^ (?:[0-9]f1,3}.){1,4}C . ^ (?:[0-9]{1,3}.)'D . ^ ([0-9]-{3})View AnswerAnswer: A

September 14, 2021No CommentsREAD MORE +

Which kind of evidence is this IP address?

An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise. Which kind of evidence is this IP address?A . best evidenceB . corroborative evidenceC . indirect evidenceD . forensic evidenceView AnswerAnswer: B

September 14, 2021No CommentsREAD MORE +

Which metric is used to capture the level of access needed to launch a successful attack?

Which metric is used to capture the level of access needed to launch a successful attack?A . privileges requiredB . user interactionC . attack complexityD . attack vectorView AnswerAnswer: A

September 14, 2021No CommentsREAD MORE +

Which type of evidence is this file?

A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format . Which type of evidence is this file?A . CD data copy prepared in WindowsB . CD data copy prepared in Mac-based systemC . CD data copy prepared in Linux...

September 14, 2021No CommentsREAD MORE +

How does certificate authority impact a security system?

How does certificate authority impact a security system?A . It authenticates client identity when requesting SSL certificateB . It validates domain identity of a SSL certificateC . It authenticates domain identity when requesting SSL certificateD . It validates client identity when communicating with the serverView AnswerAnswer: B

September 14, 2021No CommentsREAD MORE +

What is the reason for this discrepancy?

An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack . What is the reason for this discrepancy?A . The computer has a HIPS installed on it.B . The...

September 14, 2021No CommentsREAD MORE +

What is the difference between a threat and a risk?

What is the difference between a threat and a risk?A . Threat represents a potential danger that could take advantage of a weakness in a systemB . Risk represents the known and identified loss or danger in the systemC . Risk represents the nonintentional interaction with uncertainty in the systemD...

September 13, 2021No CommentsREAD MORE +

What is a difference between tampered and untampered disk images?

What is a difference between tampered and untampered disk images?A . Tampered images have the same stored and computed hash.B . Untampered images are deliberately altered to preserve as evidence.C . Tampered images are used as evidence.D . Untampered images are used for forensic investigations.View AnswerAnswer: C

September 13, 20211 CommentREAD MORE +

How does a certificate authority impact security?

How does a certificate authority impact security?A . It validates client identity when communicating with the server.B . It authenticates client identity when requesting an SSL certificate.C . It authenticates domain identity when requesting an SSL certificate.D . It validates the domain identity of the SSL certificate.View AnswerAnswer: D

September 13, 2021No CommentsREAD MORE +

Which tool provides a full packet capture from network traffic?

Which tool provides a full packet capture from network traffic?A . NagiosB . CAINEC . HydraD . WiresharkView AnswerAnswer: D

September 13, 2021No CommentsREAD MORE +