Which data element must be protected with regards to PCI?
Which data element must be protected with regards to PCI?A . past health conditionB . geographic locationC . full name / full account numberD . recent payment amountView AnswerAnswer: C
Which CVSS metric describes the conditions that are beyond the attackers control so that an attack can be successful?
Which CVSS metric describes the conditions that are beyond the attackers control so that an attack can be successful?A . User interactionB . Attack vectorC . attack complexityD . privileges requiredView AnswerAnswer: C
Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
Which two options can be used by a threat actor to determine the role of a server? (Choose two.)A . PCAPB . tracertC . running processesD . hard drive configurationE . applicationsView AnswerAnswer: CE
Which category does this event fall under as defined in the Diamond Model of Intrusion?
You see 100 HTTP GET and POST requests for various pages on one of your webservers. The user agent in the requests contain php code that, if executed, creates and writes to a new php file on the webserver. Which category does this event fall under as defined in the...
Which feature is used to find possible vulnerable services running on a server?
Which feature is used to find possible vulnerable services running on a server?A . CPU utilizationB . security policyC . temporary internet filesD . listening portsView AnswerAnswer: D
Which process is being utilized when IPS events are removed to improve data integrity?
Which process is being utilized when IPS events are removed to improve data integrity?A . data normalizationB . data availabilityC . data protectionD . data signatureView AnswerAnswer: A
Which option is the common artifact used to uniquely identify a detected file?
Which option is the common artifact used to uniquely identify a detected file?A . file sizeB . file extensionC . file timestampD . file hashView AnswerAnswer: D
Which regular expression matches "color" and "colour"?
Which regular expression matches "color" and "colour"?A . col[0-9]+ourB . colo?urC . colou?rD . ]a-z]{7}View AnswerAnswer: C
Which two potions about deterministic and probabilistic analysis are true? (Choose two.)
Which two potions about deterministic and probabilistic analysis are true? (Choose two.)A . probabilistic analysis uses data known beforehand and deterministic analysis is based off assumptions.B . Deterministic analysis uses data known beforehand and probabilistic analysis based off of assumptions.C . Deterministic analysis is based off of assumptionsD . Probabilistic...
When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?
When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?A . HTTPS trafficB . TCP trafficC . HTTP trafficD . UDP trafficView AnswerAnswer: D