What mechanism does the Linux operating system provide to control access to files?

What mechanism does the Linux operating system provide to control access to files?A . privileges requiredB . user interactionC . file permissionsD . access complexityView AnswerAnswer: C

June 8, 2018 No Comments READ MORE +

Which option can be addressed when using retrospective security techniques?

Which option can be addressed when using retrospective security techniques?A . if the affected host needs a software updateB . how the malware entered our networkC . why the malware is still in our networkD . if the affected system needs replacementView AnswerAnswer: B

June 6, 2018 No Comments READ MORE +

Which function does an internal CSIRT provide?

Which function does an internal CSIRT provide?A . incident handling services across various CSIRTsB . incident handling services for a country’s governmentC . incident handling services for a parent organization D incident handling services as a service for other organizationView AnswerAnswer: C

June 2, 2018 No Comments READ MORE +

Which user agent in the HTTP headers in the requests from your internal hosts warrants further investigation?

You receive an alert for malicious code that exploits Internet Explorer and runs arbitrary code on the site visitor machine. The malicous code is on an external site that is being visited by hosts on your network. Which user agent in the HTTP headers in the requests from your internal...

May 26, 2018 No Comments READ MORE +

Which Security Operations Center's goal is to provide incident handling to a country?

Which Security Operations Center's goal is to provide incident handling to a country?A . Coordination CenterB . Internal CSIRTC . National CSIRTD . Analysis CenterView AnswerAnswer: C

May 24, 2018 No Comments READ MORE +

Which of the following has been used to evade IDS and IPS devices?

Which of the following has been used to evade IDS and IPS devices?A . SNMPB . HTTPC . TNPD . FragmentationView AnswerAnswer: D

May 23, 2018 No Comments READ MORE +

Which netstat command show ports? (Choose two)

Which netstat command show ports? (Choose two)A . netstat -aB . netstat -lC . netstat -vD . netstat -gView AnswerAnswer: AB

May 20, 2018 No Comments READ MORE +

Which packet contains a file that is extractable within Wireshark?

Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?A . 1986B . 2318C . 2542D . 2317View AnswerAnswer: C

May 13, 2018 No Comments READ MORE +

Which of the following steps in the kill chain would come before the others?

Which of the following steps in the kill chain would come before the others?A . C2B . DeliveryC . InstallationD . ExploitationView AnswerAnswer: B

May 5, 2018 No Comments READ MORE +

At which stage attacking the vulnerability belongs in Cyber kill chain?

At which stage attacking the vulnerability belongs in Cyber kill chain?A . ExploitationView AnswerAnswer: A

May 2, 2018 No Comments READ MORE +