Which definition of Windows Registry is true?

Which definition of Windows Registry is true?A . set of pages that are currently resident m physical memoryB . basic unit to which the operating system allocates processor timeC . set of virtual memory addressesD . database that stores low-level settings for the operating systemView AnswerAnswer: D

September 30, 2018 No Comments READ MORE +

While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?

While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?A . TORB . NATC . encapsulationD . tunnelingView AnswerAnswer: B

September 28, 2018 No Comments READ MORE +

Which two actions are valid uses of public key infrastructure? (Choose two )

Which two actions are valid uses of public key infrastructure? (Choose two )A . ensuring the privacy of a certificateB . revoking the validation of a certificateC . validating the authenticity of a certificateD . creating duplicate copies of a certificateE . changing ownership of a certificateView AnswerAnswer: BC

September 26, 2018 No Comments READ MORE +

Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?

Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?A . HTTP/TLSB . IPv4/IPv6C . TCP/UDPD . ATM/ MPLSView AnswerAnswer: B

September 23, 2018 No Comments READ MORE +

Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?

Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?A . chain of evidenceB . evidence chronologyC . chain of custodyD . record of safekeepingView AnswerAnswer: C

September 22, 2018 No Comments READ MORE +

Which hashing algorithm is the least secure?

Which hashing algorithm is the least secure?A . MD5B . RC4C . SHA-3D . SHA-2View AnswerAnswer: A

September 18, 2018 No Comments READ MORE +

Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?

Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?A . exploit kitB . root kitC . vulnerability kitD . script kiddie kitView AnswerAnswer: A

September 5, 2018 No Comments READ MORE +

Which definition of a process in Windows is true?

Which definition of a process in Windows is true?A . running programB . unit of execution that must be manually scheduled by the applicationC . database that stores low-level settings for the OS and for certain applicationsD . basic unit to which the operating system allocates processor timeView AnswerAnswer: A

September 3, 2018 No Comments READ MORE +

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?A . input validationB . hash collisionC . command injectionD . integer overflowView AnswerAnswer: C

August 30, 2018 No Comments READ MORE +

While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?

While viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?A . TORB . NATC . encapsulationD . tunnelingView AnswerAnswer: B

August 27, 2018 No Comments READ MORE +