Which information security property is supported by encryption?
Which information security property is supported by encryption?A . sustainabilityB . integrityC . confidentialityD . availabilityView AnswerAnswer: C
Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?
Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?A . connection eventB . endpoint eventC . NetFlow eventD . intrusion eventView AnswerAnswer: D
Which network device is used to separate broadcast domains?
Which network device is used to separate broadcast domains?A . routerB . repeaterC . switchD . bridgeView AnswerAnswer: A
Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?
Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?A . chain of evidenceB . evidence chronologyC . chain of custodyD . record of safekeepingView AnswerAnswer: C
An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?
An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?A . traffic fragmentationB . resource exhaustionC . timing attackD . tunnelingView AnswerAnswer: B
Drag the technology on the left to the data type the technology provides on the right
DRAG DROP Drag the technology on the left to the data type the technology provides on the right. View AnswerAnswer:
If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?
If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?A . input validationB . hash collisionC . command injectionD . integer overflowView AnswerAnswer: C
Which two activities are examples of social engineering? (Choose two)
Which two activities are examples of social engineering? (Choose two)A . receiving call from the IT department asking you to verify your username/password to maintain the accountB . receiving an invite to your department's weekly WebEx meetingC . sending a verbal request to an administrator to change the password to...
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?A . replayB . man-in-the-middleC . dictionaryD . known-plaintextView AnswerAnswer: B
Which evasion method involves performing actions slower than normal to prevent detection?
Which evasion method involves performing actions slower than normal to prevent detection?A . traffic fragmentationB . tunnelingC . timing attackD . resource exhaustionView AnswerAnswer: C