- All Exams Instant Download
Which type of evidence is this?
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor. Which type of evidence is this?A . best evidenceB . prima facie evidenceC . indirect evidenceD . physical...
What does an attacker use to determine which network ports are listening on a potential target device?
What does an attacker use to determine which network ports are listening on a potential target device?A . man-in-the-middleB . port scanningC . SQL injectionD . ping sweepView AnswerAnswer: B Explanation: Port scanning is a technique that an attacker uses to discover which network ports are open, closed, or filtered...
Which testing method did the intruder use?
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network. Which...
What does the message indicate?
Refer to the exhibit. What does the message indicate?A . an access attempt was made from the Mosaic web browserB . a successful access attempt was made to retrieve the password fileC . a successful access attempt was made to retrieve the root of the websiteD . a denied access...
In which Linux log file is this output found?
Refer to the exhibit. In which Linux log file is this output found?A . /var/log/authorization.logB . /var/log/dmesgC . var/log/var.logD . /var/log/auth.logView AnswerAnswer: D Explanation: The /var/log/auth.log file contains information about authentication and authorization events on a Linux system, such as successful and failed logins, sudo commands, and SSH sessions. The...
Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?
Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?A . syslog messagesB . full packet captureC . NetFlowD . firewall event logsView AnswerAnswer: C Explanation: NetFlow provides a more efficient way of recording and analyzing network traffic patterns over...
How does an attacker observe network traffic exchanged between two users?
How does an attacker observe network traffic exchanged between two users?A . port scanningB . man-in-the-middleC . command injectionD . denial of serviceView AnswerAnswer: B Explanation: A man-in-the-middle (MITM) attack occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating...
What makes HTTPS traffic difficult to monitor?
What makes HTTPS traffic difficult to monitor?A . SSL interceptionB . packet header sizeC . signature detection timeD . encryptionView AnswerAnswer: D Explanation: HTTPS uses SSL/TLS encryption to secure data transmission over the internet. This encryption makes it difficult to monitor HTTPS traffic because the data packets are encrypted making...
Drag and drop the uses on the left onto the type of security system on the right
DRAG DROP Drag and drop the uses on the left onto the type of security system on the right. View AnswerAnswer:
Which security principle is violated by running all processes as root or administrator?
Which security principle is violated by running all processes as root or administrator?A . principle of least privilegeB . role-based access controlC . separation of dutiesD . trusted computing baseView AnswerAnswer: A Explanation: Running all processes as root or administrator violates the principle of least privilege, which states that users...