Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?

Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?A . replayB . man-in-the-middleC . dictionaryD . known-plaintextView AnswerAnswer: B

December 11, 2018 No Comments READ MORE +

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?A . Confidentiality, Integrity, and AvailabilityB . Confidentiality, Identity, and AvailabilityC . Confidentiality, Integrity, and AuthorizationD . Confidentiality, Identity, and AuthorizationView AnswerAnswer: A

December 6, 2018 No Comments READ MORE +

Which definition of permissions in Linux is true?

Which definition of permissions in Linux is true?A . rules that allow network traffic to go in and outB . table maintenance programC . written affidavit that you have to sign before using the systemD . attributes of ownership and control of an objectView AnswerAnswer: D

December 5, 2018 No Comments READ MORE +

Which term describes the act of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?

Which term describes the act of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?A . authentication tunnelingB . administrative abuseC . rights exploitationD . privilege escalationView AnswerAnswer: D

November 30, 2018 No Comments READ MORE +

Which definition of Windows Registry is true?

Which definition of Windows Registry is true?A . set of pages that are currently resident m physical memoryB . basic unit to which the operating system allocates processor timeC . set of virtual memory addressesD . database that stores low-level settings for the operating systemView AnswerAnswer: D

November 30, 2018 No Comments READ MORE +

According to RFC 1035 which transport protocol is recommended for use with DNS queries?

According to RFC 1035 which transport protocol is recommended for use with DNS queries?A . Transmission Control ProtocolB . Reliable Data ProtocolC . Hypertext Transfer ProtocolD . User Datagram ProtocolView AnswerAnswer: D

November 27, 2018 No Comments READ MORE +

Which two features must a next generation firewall include? (Choose two.)

Which two features must a next generation firewall include? (Choose two.)A . data miningB . host-based antivirusC . application visibility and controlD . Security Information and Event ManagementE . intrusion detection systemView AnswerAnswer: CE

November 24, 2018 No Comments READ MORE +

In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?

In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?A . ACKB . SYN ACKC . RSTD . PSH, ACKView AnswerAnswer: C

November 13, 2018 No Comments READ MORE +

Which two terms are types of cross site scripting attacks? (Choose two )

Which two terms are types of cross site scripting attacks? (Choose two )A . directedB . encodedC . storedD . reflectedE . cascadedView AnswerAnswer: CD

November 12, 2018 No Comments READ MORE +

Which definition of a fork in Linux is true?

Which definition of a fork in Linux is true?A . daemon to execute scheduled commandsB . parent directory name of a file pathnameC . macros for manipulating CPU setsD . new process created by a parent processView AnswerAnswer: D

November 9, 2018 No Comments READ MORE +