Which attack exploits incorrect boundary checking in network software?

Which attack exploits incorrect boundary checking in network software?A . SlowlorisB . buffer overflowC . man-in-the-middleD . SmurfView AnswerAnswer: B

November 21, 2018 No Comments READ MORE +

Which event is likely to be a false positive?

Which event is likely to be a false positive?A . Internet Relay Chat signature with an alert context buffer containing #IPS_ROCS YayB . a signature addressing an ActiveX vulnerability alert on a Microsoft developer network documentation pageC . an alert for a long HTTP request with an alert context buffer...

November 15, 2018 No Comments READ MORE +

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?A . SSHB . SNMPC . TelnetD . NetFlowView AnswerAnswer: B

November 13, 2018 No Comments READ MORE +

Which describes the best method for preserving the chain of evidence?

Which describes the best method for preserving the chain of evidence?A . Shut down the machine that is infected, remove the hard drive, and contact the local authorities.B . Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.C . Identify the...

November 12, 2018 No Comments READ MORE +

Which describes the best method for preserving the chain of evidence?

Which describes the best method for preserving the chain of evidence?A . Shut down the machine that is infected, remove the hard drive, and contact the local authorities.B . Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.C . Identify the...

November 8, 2018 No Comments READ MORE +

Which DNS Query Types pertains to email?

Refer to the exhibit. Which DNS Query Types pertains to email?A . A?B . NS?C . SOA?D . PTR?E . MX?F . TXT?View AnswerAnswer: E

October 25, 2018 No Comments READ MORE +

Which two types of data are relevant to investigating network security issues? (Choose two.)

Which two types of data are relevant to investigating network security issues? (Choose two.)A . NetFlowB . device model numbersC . syslogD . routing tablesE . private IP addressesView AnswerAnswer: A,C

October 24, 2018 No Comments READ MORE +

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?A . SSHB . SNMPC . TelnetD . NetFlowView AnswerAnswer: B

October 23, 2018 No Comments READ MORE +

In the context of a network security device like an IPS, which event would qualify as having the highest severity?

In the context of a network security device like an IPS, which event would qualify as having the highest severity?A . remote code execution attemptB . brute force login attemptC . denial of service attackD . instant messenger activityView AnswerAnswer: A

October 23, 2018 No Comments READ MORE +

Where should you report suspected security vulnerability in Cisco router software?

Where should you report suspected security vulnerability in Cisco router software?A . Cisco TACB . Cisco IOS EngineeringC . Cisco PSIRTD . Cisco SIOView AnswerAnswer: C

October 22, 2018 No Comments READ MORE +