- All Exams Instant Download
Which evasion technique is a function of ransomware?
Which evasion technique is a function of ransomware?A . extended sleep callsB . encryptionC . resource exhaustionD . encodingView AnswerAnswer: B Explanation: Encryption is an evasion technique that is a function of ransomware, which is a type of malware that encrypts the victim’s files or system and demands a ransom...
Drag and drop the security concept on the left onto the example of that concept on the right
DRAG DROP Drag and drop the security concept on the left onto the example of that concept on the right. View AnswerAnswer:
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?A . known-plaintextB . replayC . dictionaryD . man-in-the-middleView AnswerAnswer: D Explanation: A man-in-the-middle attack occurs when a third party intercepts and potentially alters the communication between two parties (in this case,...
Which process is used when IPS events are removed to improve data integrity?
Which process is used when IPS events are removed to improve data integrity?A . data availabilityB . data normalizationC . data signatureD . data protectionView AnswerAnswer: B
Which type of log is displayed?
Refer to the exhibit. Which type of log is displayed?A . IDSB . proxyC . NetFlowD . sysView AnswerAnswer: D Explanation: The exhibit displays a sys log which is used in computer systems for messaging logs. It provides messaging tracking services from different devices like routers, switches etc., which helps...
What is a difference between SOAR and SIEM?
What is a difference between SOAR and SIEM?A . SOAR platforms are used for threat and vulnerability management, but SIEM applications are notB . SIEM applications are used for threat and vulnerability management, but SOAR platforms are notC . SOAR receives information from a single platform and delivers it to...
How is this type of conversation classified?
At a company party a guest asks questions about the company’s user account format and password complexity. How is this type of conversation classified?A . Phishing attackB . Password Revelation StrategyC . PiggybackingD . Social EngineeringView AnswerAnswer: D Explanation: Social engineering is the practice of manipulating or deceiving people into...
Which piece of information is needed for attribution in an investigation?
Which piece of information is needed for attribution in an investigation?A . proxy logs showing the source RFC 1918 IP addressesB . RDP allowed from the InternetC . known threat actor behaviorD . 802.1x RADIUS authentication pass arid fail logsView AnswerAnswer: C Explanation: Cyber attribution is the process of identifying...
What is the practice of giving an employee access to only the resources needed to accomplish their job?
What is the practice of giving an employee access to only the resources needed to accomplish their job?A . principle of least privilegeB . organizational separationC . separation of dutiesD . need to know principleView AnswerAnswer: A Explanation: The principle of least privilege is a security best practice that states...
What type of evidence is this file?
An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?A . data from a CD copied using Mac-based systemB . data from a CD copied using Linux systemC . data from a DVD copied using Windows systemD...