- All Exams Instant Download
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?A . MAC is controlled by the discretion of the owner and DAC is controlled by an administratorB . MAC is the strictest of all levels of control and DAC is object-based accessC . DAC is controlled...
What is the difference between the rule-based detection when compared to behavioral detection?
What is the difference between the rule-based detection when compared to behavioral detection?A . Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.B . Rule-Based systems have established patterns that do not change with new data, while behavioral changes.C . Behavioral...
What is the reason for this discrepancy?
An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?A . The computer has a HIPS installed on it.B . The computer...
Which category relates to improper use or disclosure of PII data?
Which category relates to improper use or disclosure of PII data?A . legalB . complianceC . regulatedD . contractualView AnswerAnswer: C
How does an attacker observe network traffic exchanged between two users?
How does an attacker observe network traffic exchanged between two users?A . port scanningB . man-in-the-middleC . command injectionD . denial of serviceView AnswerAnswer: B
What is depicted in the exhibit?
Refer to the exhibit. What is depicted in the exhibit?A . Windows Event logsB . Apache logsC . IIS logsD . UNIX-based syslogView AnswerAnswer: D
Which type of log is displayed?
Refer to the exhibit. Which type of log is displayed?A . IDSB . proxyC . NetFlowD . sysView AnswerAnswer: D
What is the impact of this traffic?
An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?A . ransomware communicating after infectionB . users downloading copyrighted contentC . data exfiltrationD . user circumvention of the firewallView AnswerAnswer: D
What is the virtual address space for a Windows process?
What is the virtual address space for a Windows process?A . physical location of an object in memoryB . set of pages that reside in the physical memoryC . system-level memory protection feature built into the operating systemD . set of virtual memory addresses that can be usedView AnswerAnswer: D
What is occurring in this network?
Refer to the exhibit. What is occurring in this network?A . ARP cache poisoningB . DNS cache poisoningC . MAC address table overflowD . MAC flooding attackView AnswerAnswer: A