Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)

Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)A . Confirm the timing of network connections differentiated by the TCP 5-tupleB . Audit the applications used within a social networking web site.C . Determine the user IDs involved in an instant messaging...

November 5, 2018 No Comments READ MORE +

Which identifier is used to describe the application or process that submitted a log message?

Which identifier is used to describe the application or process that submitted a log message?A . actionB . selectorC . priorityD . facilityView AnswerAnswer: D

November 3, 2018 No Comments READ MORE +

Which term represents a potential danger that could take advantage of a weakness in a system?

Which term represents a potential danger that could take advantage of a weakness in a system?A . vulnerabilityB . riskC . threatD . exploitView AnswerAnswer: C

November 3, 2018 No Comments READ MORE +

Which two options are recognized forms of phishing? (Choose two )

Which two options are recognized forms of phishing? (Choose two )A . spearB . whalingC . mailbombD . hookingE . mailnetView AnswerAnswer: AB

October 31, 2018 No Comments READ MORE +

Which concern is important when monitoring NTP servers for abnormal levels of traffic?

Which concern is important when monitoring NTP servers for abnormal levels of traffic?A . Being the cause of a distributed reflection denial of service attack.B . Users changing the time settings on their systems.C . A critical server may not have the correct time synchronized.D . Watching for rogue devices...

October 31, 2018 No Comments READ MORE +

Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?

Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?A . exploit kitB . root kitC . vulnerability kitD . script kiddie kitView AnswerAnswer: A

October 30, 2018 No Comments READ MORE +

Which statement about digitally signing a document is true?

Which statement about digitally signing a document is true?A . The document is hashed and then the document is encrypted with the private key.B . The document is hashed and then the hash is encrypted with the private key.C . The document is encrypted and then the document is hashed...

October 21, 2018 No Comments READ MORE +

Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?

Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?A . connection eventB . endpoint eventC . NetFlow eventD . intrusion eventView AnswerAnswer: D

October 21, 2018 No Comments READ MORE +

Which two activities are examples of social engineering? (Choose two)

Which two activities are examples of social engineering? (Choose two)A . receiving call from the IT department asking you to verify your username/password to maintain the accountB . receiving an invite to your department's weekly WebEx meetingC . sending a verbal request to an administrator to change the password to...

October 9, 2018 No Comments READ MORE +

Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?

Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?A . integrity validationB . due diligenceC . need to knowD . least privilegeView AnswerAnswer: D

October 8, 2018 No Comments READ MORE +