What are two denial of service attacks? (Choose two.)
What are two denial of service attacks? (Choose two.)A . MITMB . TCP connectionsC . ping of deathD . UDP floodingE . code redView AnswerAnswer: C,D
What is an attack surface as compared to a vulnerability?
What is an attack surface as compared to a vulnerability?A . any potential danger to an assetB . the sum of all paths for data into and out of the environmentC . an exploitable weakness in a system or its designD . the individuals who perform an attackView AnswerAnswer: C...
Which command will accomplish this goal?
An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?A . nmap --top-ports 192.168.1.0/24B . nmap CsP 192.168.1.0/24C . nmap -sL 192.168.1.0/24D . nmap -sV 192.168.1.0/24View AnswerAnswer: C
What is the potential threat identified in this Stealthwatch dashboard?
Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?A . A policy violation is active for host 10.10.101.24.B . A host on the network is sending a DDoS attack to another inside host.C . There are two active data exfiltration alerts.D . A policy violation...
What is the difference between an attack vector and attack surface?
What is the difference between an attack vector and attack surface?A . An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.B . An attack vector identifies components that can be exploited; and an attack surface identifies...
What is the potential threat identified in this Stealthwatch dashboard?
Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?A . A policy violation is active for host 10.10.101.24.B . A host on the network is sending a DDoS attack to another inside host.C . There are three active data exfiltration alerts.D . A policy violation...
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?A . Tapping interrogation replicates signals to a separate port for analyzing trafficB . Tapping interrogations detect and block malicious trafficC . Inline interrogation enables viewing a copy...
What is personally identifiable information that must be safeguarded from unauthorized access?
What is personally identifiable information that must be safeguarded from unauthorized access?A . date of birthB . driver's license numberC . genderD . zip codeView AnswerAnswer: B
What does this output indicate?
Refer to the exhibit. What does this output indicate?A . HTTPS ports are open on the server.B . SMB ports are closed on the server.C . FTP ports are open on the server.D . Email ports are closed on the server.View AnswerAnswer: A
In a SOC environment, what is a vulnerability management metric?
In a SOC environment, what is a vulnerability management metric?A . code signing enforcementB . full assets scanC . internet exposed devicesD . single factor authenticationView AnswerAnswer: C