Which definition of Windows Registry is true?
Which definition of Windows Registry is true?A . set of pages that are currently resident m physical memoryB . basic unit to which the operating system allocates processor timeC . set of virtual memory addressesD . database that stores low-level settings for the operating systemView AnswerAnswer: D
While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?
While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?A . TORB . NATC . encapsulationD . tunnelingView AnswerAnswer: B
Which two actions are valid uses of public key infrastructure? (Choose two )
Which two actions are valid uses of public key infrastructure? (Choose two )A . ensuring the privacy of a certificateB . revoking the validation of a certificateC . validating the authenticity of a certificateD . creating duplicate copies of a certificateE . changing ownership of a certificateView AnswerAnswer: BC
Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?
Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?A . HTTP/TLSB . IPv4/IPv6C . TCP/UDPD . ATM/ MPLSView AnswerAnswer: B
Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?
Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?A . chain of evidenceB . evidence chronologyC . chain of custodyD . record of safekeepingView AnswerAnswer: C
Which hashing algorithm is the least secure?
Which hashing algorithm is the least secure?A . MD5B . RC4C . SHA-3D . SHA-2View AnswerAnswer: A
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?A . exploit kitB . root kitC . vulnerability kitD . script kiddie kitView AnswerAnswer: A
Which definition of a process in Windows is true?
Which definition of a process in Windows is true?A . running programB . unit of execution that must be manually scheduled by the applicationC . database that stores low-level settings for the OS and for certain applicationsD . basic unit to which the operating system allocates processor timeView AnswerAnswer: A
If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?
If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?A . input validationB . hash collisionC . command injectionD . integer overflowView AnswerAnswer: C
While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?
While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?A . TORB . NATC . encapsulationD . tunnelingView AnswerAnswer: B