What are two denial of service attacks? (Choose two.)

What are two denial of service attacks? (Choose two.)A . MITMB . TCP connectionsC . ping of deathD . UDP floodingE . code redView AnswerAnswer: C,D

June 3, 2021No CommentsREAD MORE +

What is an attack surface as compared to a vulnerability?

What is an attack surface as compared to a vulnerability?A . any potential danger to an assetB . the sum of all paths for data into and out of the environmentC . an exploitable weakness in a system or its designD . the individuals who perform an attackView AnswerAnswer: C...

June 2, 2021No CommentsREAD MORE +

Which command will accomplish this goal?

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?A . nmap --top-ports 192.168.1.0/24B . nmap CsP 192.168.1.0/24C . nmap -sL 192.168.1.0/24D . nmap -sV 192.168.1.0/24View AnswerAnswer: C

June 1, 2021No CommentsREAD MORE +

What is the potential threat identified in this Stealthwatch dashboard?

Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?A . A policy violation is active for host 10.10.101.24.B . A host on the network is sending a DDoS attack to another inside host.C . There are two active data exfiltration alerts.D . A policy violation...

June 1, 2021No CommentsREAD MORE +

What is the difference between an attack vector and attack surface?

What is the difference between an attack vector and attack surface?A . An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.B . An attack vector identifies components that can be exploited; and an attack surface identifies...

June 1, 2021No CommentsREAD MORE +

What is the potential threat identified in this Stealthwatch dashboard?

Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?A . A policy violation is active for host 10.10.101.24.B . A host on the network is sending a DDoS attack to another inside host.C . There are three active data exfiltration alerts.D . A policy violation...

June 1, 2021No CommentsREAD MORE +

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?A . Tapping interrogation replicates signals to a separate port for analyzing trafficB . Tapping interrogations detect and block malicious trafficC . Inline interrogation enables viewing a copy...

June 1, 2021No CommentsREAD MORE +

What is personally identifiable information that must be safeguarded from unauthorized access?

What is personally identifiable information that must be safeguarded from unauthorized access?A . date of birthB . driver's license numberC . genderD . zip codeView AnswerAnswer: B

May 31, 2021No CommentsREAD MORE +

What does this output indicate?

Refer to the exhibit. What does this output indicate?A . HTTPS ports are open on the server.B . SMB ports are closed on the server.C . FTP ports are open on the server.D . Email ports are closed on the server.View AnswerAnswer: A

May 30, 20211 CommentREAD MORE +

In a SOC environment, what is a vulnerability management metric?

In a SOC environment, what is a vulnerability management metric?A . code signing enforcementB . full assets scanC . internet exposed devicesD . single factor authenticationView AnswerAnswer: C

May 30, 2021No CommentsREAD MORE +