Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?
Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?A . integrity validationB . due diligenceC . need to knowD . least privilegeView AnswerAnswer: D
For which reason can HTTPS traffic make security monitoring difficult?
For which reason can HTTPS traffic make security monitoring difficult?A . encryptionB . large packet headersC . Signature detection takes longer.D . SSL interceptionView AnswerAnswer: A
Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?
Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?A . NTPB . HTTPC . DNSD . SSHView AnswerAnswer: B
In computer security, which information is the term PHI used to describe?
In computer security, which information is the term PHI used to describe?A . private host informationB . protected health informationC . personal health informationD . protected host informationView AnswerAnswer: B
Drag the data source on the left to the left to the correct data type on the right
DRAG DROP Drag the data source on the left to the left to the correct data type on the right. View AnswerAnswer:
Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)
Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)A . Confirm the timing of network connections differentiated by the TCP 5-tupleB . Audit the applications used within a social networking web site.C . Determine the user IDs involved in an instant messaging...
Which identifier is used to describe the application or process that submitted a log message?
Which identifier is used to describe the application or process that submitted a log message?A . actionB . selectorC . priorityD . facilityView AnswerAnswer: D
Which concern is important when monitoring NTP servers for abnormal levels of traffic?
Which concern is important when monitoring NTP servers for abnormal levels of traffic?A . Being the cause of a distributed reflection denial of service attack.B . Users changing the time settings on their systems.C . A critical server may not have the correct time synchronized.D . Watching for rogue devices...
Which security monitoring data type is associated with application server logs?
Which security monitoring data type is associated with application server logs?A . alert dataB . statistical dataC . session dataD . transaction dataView AnswerAnswer: D
Drag the data source on the left to the left to the correct data type on the right
DRAG DROP Drag the data source on the left to the left to the correct data type on the right. View AnswerAnswer: