Which data element must be protected with regards to PCI?

Which data element must be protected with regards to PCI?A . past health conditionB . geographic locationC . full name / full account numberD . recent payment amountView AnswerAnswer: C

October 25, 2018 No Comments READ MORE +

Which CVSS metric describes the conditions that are beyond the attackers control so that an attack can be successful?

Which CVSS metric describes the conditions that are beyond the attackers control so that an attack can be successful?A . User interactionB . Attack vectorC . attack complexityD . privileges requiredView AnswerAnswer: C

October 24, 2018 No Comments READ MORE +

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)A . PCAPB . tracertC . running processesD . hard drive configurationE . applicationsView AnswerAnswer: CE

October 22, 2018 No Comments READ MORE +

Which category does this event fall under as defined in the Diamond Model of Intrusion?

You see 100 HTTP GET and POST requests for various pages on one of your webservers. The user agent in the requests contain php code that, if executed, creates and writes to a new php file on the webserver. Which category does this event fall under as defined in the...

October 19, 2018 No Comments READ MORE +

Which feature is used to find possible vulnerable services running on a server?

Which feature is used to find possible vulnerable services running on a server?A . CPU utilizationB . security policyC . temporary internet filesD . listening portsView AnswerAnswer: D

October 17, 2018 No Comments READ MORE +

Which process is being utilized when IPS events are removed to improve data integrity?

Which process is being utilized when IPS events are removed to improve data integrity?A . data normalizationB . data availabilityC . data protectionD . data signatureView AnswerAnswer: A

October 15, 2018 No Comments READ MORE +

Which option is the common artifact used to uniquely identify a detected file?

Which option is the common artifact used to uniquely identify a detected file?A . file sizeB . file extensionC . file timestampD . file hashView AnswerAnswer: D

October 11, 2018 No Comments READ MORE +

Which regular expression matches "color" and "colour"?

Which regular expression matches "color" and "colour"?A . col[0-9]+ourB . colo?urC . colou?rD . ]a-z]{7}View AnswerAnswer: C

October 8, 2018 No Comments READ MORE +

Which two potions about deterministic and probabilistic analysis are true? (Choose two.)

Which two potions about deterministic and probabilistic analysis are true? (Choose two.)A . probabilistic analysis uses data known beforehand and deterministic analysis is based off assumptions.B . Deterministic analysis uses data known beforehand and probabilistic analysis based off of assumptions.C . Deterministic analysis is based off of assumptionsD . Probabilistic...

October 7, 2018 No Comments READ MORE +

When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?

When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?A . HTTPS trafficB . TCP trafficC . HTTP trafficD . UDP trafficView AnswerAnswer: D

October 5, 2018 No Comments READ MORE +