Which string matches the regular expression r(ege)+x?
Which string matches the regular expression r(ege)+x?A . rxB . regeegexC . r(ege)xD . rege+xView AnswerAnswer: B
Which source provides reports of vulnerabilities in software and hardware to a Security Operations Center?
Which source provides reports of vulnerabilities in software and hardware to a Security Operations Center?A . Analysis CenterB . National CSIRTC . Internal CSIRTD . Physical SecurityView AnswerAnswer: C
Which of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?
Which of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?A . CSIRTB . ICASIC . USIRPD . PSIRTView AnswerAnswer: D
What is Data mapping used for? (Choose two)
What is Data mapping used for? (Choose two)A . data accuracy (integrity)B . data availabilityC . data normalizationD . data confidentialityE . data visualisationView AnswerAnswer: AE
Which of the following is an example of a coordination center?
Which of the following is an example of a coordination center?A . Cisco PSIRTB . Microsoft MSRCC . CERT division of the Software Engineering Institute (SEI)D . FIRSTView AnswerAnswer: C
Which regular expression matches "color" and "colour"?
Which regular expression matches "color" and "colour"?A . col[0-9]+ourB . colo?urC . colou?rD . ]a-z]{7}View AnswerAnswer: C
According to NIST 86, which action describes the volatile data collection?
According to NIST 86, which action describes the volatile data collection?A . Collect data before rebootingB . Collect data while rebootingC . Collect data after rebootingD . Collect data that contains malwareView AnswerAnswer: A
Which of the following statements is true about this packet capture?
Refer to the following packet capture. 00:00:04.549138 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq 3152949738, win 29200, options [mss 1460,sackOK,TS val 1193148797 ecr 0,nop,wscale 7], length 0 00:00:05.547084 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq 3152949738, win 29200, options [mss 1460,sackOK,TS val 1193149047 ecr 0,nop,wscale 7], length 0 00:00:07.551078 IP...
Which type of intrusion event is an attacker retrieving the robots. txt file from target site?
Which type of intrusion event is an attacker retrieving the robots. txt file from target site?A . exploitationB . weaponizationC . scanningD . reconnaissanceView AnswerAnswer: D
Which network device creates and sends the initial packet of a session?
Which network device creates and sends the initial packet of a session?A . sourceB . originationC . destinationD . networkView AnswerAnswer: A