What mechanism does the Linux operating system provide to control access to files?
What mechanism does the Linux operating system provide to control access to files?A . privileges requiredB . user interactionC . file permissionsD . access complexityView AnswerAnswer: C
Which option can be addressed when using retrospective security techniques?
Which option can be addressed when using retrospective security techniques?A . if the affected host needs a software updateB . how the malware entered our networkC . why the malware is still in our networkD . if the affected system needs replacementView AnswerAnswer: B
Which function does an internal CSIRT provide?
Which function does an internal CSIRT provide?A . incident handling services across various CSIRTsB . incident handling services for a country’s governmentC . incident handling services for a parent organization D incident handling services as a service for other organizationView AnswerAnswer: C
Which user agent in the HTTP headers in the requests from your internal hosts warrants further investigation?
You receive an alert for malicious code that exploits Internet Explorer and runs arbitrary code on the site visitor machine. The malicous code is on an external site that is being visited by hosts on your network. Which user agent in the HTTP headers in the requests from your internal...
Which Security Operations Center's goal is to provide incident handling to a country?
Which Security Operations Center's goal is to provide incident handling to a country?A . Coordination CenterB . Internal CSIRTC . National CSIRTD . Analysis CenterView AnswerAnswer: C
Which of the following has been used to evade IDS and IPS devices?
Which of the following has been used to evade IDS and IPS devices?A . SNMPB . HTTPC . TNPD . FragmentationView AnswerAnswer: D
Which netstat command show ports? (Choose two)
Which netstat command show ports? (Choose two)A . netstat -aB . netstat -lC . netstat -vD . netstat -gView AnswerAnswer: AB
Which packet contains a file that is extractable within Wireshark?
Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?A . 1986B . 2318C . 2542D . 2317View AnswerAnswer: C
Which of the following steps in the kill chain would come before the others?
Which of the following steps in the kill chain would come before the others?A . C2B . DeliveryC . InstallationD . ExploitationView AnswerAnswer: B
At which stage attacking the vulnerability belongs in Cyber kill chain?
At which stage attacking the vulnerability belongs in Cyber kill chain?A . ExploitationView AnswerAnswer: A