Which two options are recognized forms of phishing? (Choose two )
Which two options are recognized forms of phishing? (Choose two )A . spearB . whalingC . mailbombD . hookingE . mailnetView AnswerAnswer: AB
Which term represents a weakness in a system that could lead to the system being compromised?
Which term represents a weakness in a system that could lead to the system being compromised?A . vulnerabilityB . threatC . exploitD . riskView AnswerAnswer: A
In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?
In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?A . ACKB . SYN ACKC . RSTD . PSH, ACKView AnswerAnswer: C
Which type of exploit normally requires the culprit to have prior access to the target system?
Which type of exploit normally requires the culprit to have prior access to the target system?A . local exploitB . denial of serviceC . system vulnerabilityD . remote exploitView AnswerAnswer: A
Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?
Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?A . NTPB . HTTPC . DNSD . SSHView AnswerAnswer: B
Which definition of a process in Windows is true?
Which definition of a process in Windows is true?A . running programB . unit of execution that must be manually scheduled by the applicationC . database that stores low-level settings for the OS and for certain applicationsD . basic unit to which the operating system allocates processor timeView AnswerAnswer: A
Which definition of a fork in Linux is true?
Which definition of a fork in Linux is true?A . daemon to execute scheduled commandsB . parent directory name of a file pathnameC . macros for manipulating CPU setsD . new process created by a parent processView AnswerAnswer: D
Which term represents a potential danger that could take advantage of a weakness in a system?
Which term represents a potential danger that could take advantage of a weakness in a system?A . vulnerabilityB . riskC . threatD . exploitView AnswerAnswer: C
Which type of exploit normally requires the culprit to have prior access to the target system?
Which type of exploit normally requires the culprit to have prior access to the target system?A . local exploitB . denial of serviceC . system vulnerabilityD . remote exploitView AnswerAnswer: A
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?A . Confidentiality, Integrity, and AvailabilityB . Confidentiality, Identity, and AvailabilityC . Confidentiality, Integrity, and AuthorizationD . Confidentiality, Identity, and AuthorizationView AnswerAnswer: A