right

DRAG DROP Drag and drop the technology on the left onto the data type the technology provides on the right. View AnswerAnswer:

May 24, 2021No CommentsREAD MORE +

Which kind of evidence is this IP address?

An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise. Which kind of evidence is this IP address?A . best evidenceB . corroborative evidenceC . indirect evidenceD . forensic evidenceView AnswerAnswer: B

February 12, 2021No CommentsREAD MORE +

Which access control model does SELinux use?

Which access control model does SELinux use?A . RBACB . DACC . MACD . ABACView AnswerAnswer: C

February 11, 2021No CommentsREAD MORE +

Which regular expression matches "color" and "colour"?

Which regular expression matches "color" and "colour"?A . colo?urB . col[08]+ourC . colou?rD . col[09]+ourView AnswerAnswer: C

February 11, 2021No CommentsREAD MORE +

Which security principle is violated by running all processes as root or administrator?

Which security principle is violated by running all processes as root or administrator?A . principle of least privilegeB . role-based access controlC . separation of dutiesD . trusted computing baseView AnswerAnswer: A

February 11, 2021No CommentsREAD MORE +

How is attacking a vulnerability categorized?

How is attacking a vulnerability categorized?A . action on objectivesB . deliveryC . exploitationD . installationView AnswerAnswer: C

February 11, 2021No CommentsREAD MORE +

Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?

A system administrator is ensuring that specific registry information is accurate. Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?A . file extension associationsB . hardware, software, and security settings for the systemC . currently logged in users, including folders and control panel settingsD . all users on the...

February 10, 2021No CommentsREAD MORE +

How does an SSL certificate impact security between the client and the server?

How does an SSL certificate impact security between the client and the server?A . by enabling an authenticated channel between the client and the serverB . by creating an integrated channel between the client and the serverC . by enabling an authorized channel between the client and the serverD ....

February 10, 2021No CommentsREAD MORE +

Why is encryption challenging to security monitoring?

Why is encryption challenging to security monitoring?A . Encryption analysis is used by attackers to monitor VPN tunnels.B . Encryption is used by threat actors as a method of evasion and obfuscation.C . Encryption introduces additional processing requirements by the CPE . Encryption introduces larger packet sizes to analyze and...

February 9, 2021No CommentsREAD MORE +

What are the two characteristics of the full packet captures? (Choose two.)

What are the two characteristics of the full packet captures? (Choose two.)A . Identifying network loops and collision domains.B . Troubleshooting the cause of security and performance issues.C . Reassembling fragmented traffic from raw data.D . Detecting common hardware faults and identify faulty assets.E . Providing a historical record of...

February 9, 2021No CommentsREAD MORE +