Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)
Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)A . Confirm the timing of network connections differentiated by the TCP 5-tupleB . Audit the applications used within a social networking web site.C . Determine the user IDs involved in an instant messaging...
Which identifier is used to describe the application or process that submitted a log message?
Which identifier is used to describe the application or process that submitted a log message?A . actionB . selectorC . priorityD . facilityView AnswerAnswer: D
Which term represents a potential danger that could take advantage of a weakness in a system?
Which term represents a potential danger that could take advantage of a weakness in a system?A . vulnerabilityB . riskC . threatD . exploitView AnswerAnswer: C
Which two options are recognized forms of phishing? (Choose two )
Which two options are recognized forms of phishing? (Choose two )A . spearB . whalingC . mailbombD . hookingE . mailnetView AnswerAnswer: AB
Which concern is important when monitoring NTP servers for abnormal levels of traffic?
Which concern is important when monitoring NTP servers for abnormal levels of traffic?A . Being the cause of a distributed reflection denial of service attack.B . Users changing the time settings on their systems.C . A critical server may not have the correct time synchronized.D . Watching for rogue devices...
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?A . exploit kitB . root kitC . vulnerability kitD . script kiddie kitView AnswerAnswer: A
Which statement about digitally signing a document is true?
Which statement about digitally signing a document is true?A . The document is hashed and then the document is encrypted with the private key.B . The document is hashed and then the hash is encrypted with the private key.C . The document is encrypted and then the document is hashed...
Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?
Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?A . connection eventB . endpoint eventC . NetFlow eventD . intrusion eventView AnswerAnswer: D
Which two activities are examples of social engineering? (Choose two)
Which two activities are examples of social engineering? (Choose two)A . receiving call from the IT department asking you to verify your username/password to maintain the accountB . receiving an invite to your department's weekly WebEx meetingC . sending a verbal request to an administrator to change the password to...
Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?
Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?A . integrity validationB . due diligenceC . need to knowD . least privilegeView AnswerAnswer: D