Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?A . replayB . man-in-the-middleC . dictionaryD . known-plaintextView AnswerAnswer: B
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?A . Confidentiality, Integrity, and AvailabilityB . Confidentiality, Identity, and AvailabilityC . Confidentiality, Integrity, and AuthorizationD . Confidentiality, Identity, and AuthorizationView AnswerAnswer: A
Which definition of permissions in Linux is true?
Which definition of permissions in Linux is true?A . rules that allow network traffic to go in and outB . table maintenance programC . written affidavit that you have to sign before using the systemD . attributes of ownership and control of an objectView AnswerAnswer: D
Which term describes the act of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?
Which term describes the act of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?A . authentication tunnelingB . administrative abuseC . rights exploitationD . privilege escalationView AnswerAnswer: D
Which definition of Windows Registry is true?
Which definition of Windows Registry is true?A . set of pages that are currently resident m physical memoryB . basic unit to which the operating system allocates processor timeC . set of virtual memory addressesD . database that stores low-level settings for the operating systemView AnswerAnswer: D
According to RFC 1035 which transport protocol is recommended for use with DNS queries?
According to RFC 1035 which transport protocol is recommended for use with DNS queries?A . Transmission Control ProtocolB . Reliable Data ProtocolC . Hypertext Transfer ProtocolD . User Datagram ProtocolView AnswerAnswer: D
Which two features must a next generation firewall include? (Choose two.)
Which two features must a next generation firewall include? (Choose two.)A . data miningB . host-based antivirusC . application visibility and controlD . Security Information and Event ManagementE . intrusion detection systemView AnswerAnswer: CE
In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?
In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?A . ACKB . SYN ACKC . RSTD . PSH, ACKView AnswerAnswer: C
Which two terms are types of cross site scripting attacks? (Choose two )
Which two terms are types of cross site scripting attacks? (Choose two )A . directedB . encodedC . storedD . reflectedE . cascadedView AnswerAnswer: CD
Which definition of a fork in Linux is true?
Which definition of a fork in Linux is true?A . daemon to execute scheduled commandsB . parent directory name of a file pathnameC . macros for manipulating CPU setsD . new process created by a parent processView AnswerAnswer: D