Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?

Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?A . integrity validationB . due diligenceC . need to knowD . least privilegeView AnswerAnswer: D

January 26, 2019 No Comments READ MORE +

For which reason can HTTPS traffic make security monitoring difficult?

For which reason can HTTPS traffic make security monitoring difficult?A . encryptionB . large packet headersC . Signature detection takes longer.D . SSL interceptionView AnswerAnswer: A

January 25, 2019 No Comments READ MORE +

Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?

Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?A . NTPB . HTTPC . DNSD . SSHView AnswerAnswer: B

January 25, 2019 No Comments READ MORE +

In computer security, which information is the term PHI used to describe?

In computer security, which information is the term PHI used to describe?A . private host informationB . protected health informationC . personal health informationD . protected host informationView AnswerAnswer: B

January 24, 2019 No Comments READ MORE +

Drag the data source on the left to the left to the correct data type on the right

DRAG DROP Drag the data source on the left to the left to the correct data type on the right. View AnswerAnswer:

January 19, 2019 No Comments READ MORE +

Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)

Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)A . Confirm the timing of network connections differentiated by the TCP 5-tupleB . Audit the applications used within a social networking web site.C . Determine the user IDs involved in an instant messaging...

January 18, 2019 No Comments READ MORE +

Which identifier is used to describe the application or process that submitted a log message?

Which identifier is used to describe the application or process that submitted a log message?A . actionB . selectorC . priorityD . facilityView AnswerAnswer: D

January 14, 2019 No Comments READ MORE +

Which concern is important when monitoring NTP servers for abnormal levels of traffic?

Which concern is important when monitoring NTP servers for abnormal levels of traffic?A . Being the cause of a distributed reflection denial of service attack.B . Users changing the time settings on their systems.C . A critical server may not have the correct time synchronized.D . Watching for rogue devices...

January 12, 2019 No Comments READ MORE +

Which security monitoring data type is associated with application server logs?

Which security monitoring data type is associated with application server logs?A . alert dataB . statistical dataC . session dataD . transaction dataView AnswerAnswer: D

January 10, 2019 No Comments READ MORE +

Drag the data source on the left to the left to the correct data type on the right

DRAG DROP Drag the data source on the left to the left to the correct data type on the right. View AnswerAnswer:

January 9, 2019 No Comments READ MORE +