Which information security property is supported by encryption?

Which information security property is supported by encryption?A . sustainabilityB . integrityC . confidentialityD . availabilityView AnswerAnswer: C

January 6, 2019 No Comments READ MORE +

Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?

Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?A . connection eventB . endpoint eventC . NetFlow eventD . intrusion eventView AnswerAnswer: D

December 26, 2018 No Comments READ MORE +

Which network device is used to separate broadcast domains?

Which network device is used to separate broadcast domains?A . routerB . repeaterC . switchD . bridgeView AnswerAnswer: A

December 24, 2018 No Comments READ MORE +

Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?

Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?A . chain of evidenceB . evidence chronologyC . chain of custodyD . record of safekeepingView AnswerAnswer: C

December 24, 2018 No Comments READ MORE +

An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?

An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?A . traffic fragmentationB . resource exhaustionC . timing attackD . tunnelingView AnswerAnswer: B

December 21, 2018 No Comments READ MORE +

Drag the technology on the left to the data type the technology provides on the right

DRAG DROP Drag the technology on the left to the data type the technology provides on the right. View AnswerAnswer: 

December 20, 2018 No Comments READ MORE +

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?A . input validationB . hash collisionC . command injectionD . integer overflowView AnswerAnswer: C

December 18, 2018 No Comments READ MORE +

Which two activities are examples of social engineering? (Choose two)

Which two activities are examples of social engineering? (Choose two)A . receiving call from the IT department asking you to verify your username/password to maintain the accountB . receiving an invite to your department's weekly WebEx meetingC . sending a verbal request to an administrator to change the password to...

December 17, 2018 No Comments READ MORE +

Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?

Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?A . replayB . man-in-the-middleC . dictionaryD . known-plaintextView AnswerAnswer: B

December 15, 2018 No Comments READ MORE +

Which evasion method involves performing actions slower than normal to prevent detection?

Which evasion method involves performing actions slower than normal to prevent detection?A . traffic fragmentationB . tunnelingC . timing attackD . resource exhaustionView AnswerAnswer: C

December 14, 2018 No Comments READ MORE +