right
DRAG DROP Drag and drop the technology on the left onto the data type the technology provides on the right. View AnswerAnswer:
Which kind of evidence is this IP address?
An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise. Which kind of evidence is this IP address?A . best evidenceB . corroborative evidenceC . indirect evidenceD . forensic evidenceView AnswerAnswer: B
Which access control model does SELinux use?
Which access control model does SELinux use?A . RBACB . DACC . MACD . ABACView AnswerAnswer: C
Which regular expression matches "color" and "colour"?
Which regular expression matches "color" and "colour"?A . colo?urB . col[08]+ourC . colou?rD . col[09]+ourView AnswerAnswer: C
Which security principle is violated by running all processes as root or administrator?
Which security principle is violated by running all processes as root or administrator?A . principle of least privilegeB . role-based access controlC . separation of dutiesD . trusted computing baseView AnswerAnswer: A
How is attacking a vulnerability categorized?
How is attacking a vulnerability categorized?A . action on objectivesB . deliveryC . exploitationD . installationView AnswerAnswer: C
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?
A system administrator is ensuring that specific registry information is accurate. Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?A . file extension associationsB . hardware, software, and security settings for the systemC . currently logged in users, including folders and control panel settingsD . all users on the...
How does an SSL certificate impact security between the client and the server?
How does an SSL certificate impact security between the client and the server?A . by enabling an authenticated channel between the client and the serverB . by creating an integrated channel between the client and the serverC . by enabling an authorized channel between the client and the serverD ....
Why is encryption challenging to security monitoring?
Why is encryption challenging to security monitoring?A . Encryption analysis is used by attackers to monitor VPN tunnels.B . Encryption is used by threat actors as a method of evasion and obfuscation.C . Encryption introduces additional processing requirements by the CPE . Encryption introduces larger packet sizes to analyze and...
What are the two characteristics of the full packet captures? (Choose two.)
What are the two characteristics of the full packet captures? (Choose two.)A . Identifying network loops and collision domains.B . Troubleshooting the cause of security and performance issues.C . Reassembling fragmented traffic from raw data.D . Detecting common hardware faults and identify faulty assets.E . Providing a historical record of...