What type of security device is this?

A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?A . Host IDSB . Active responseC . Intrusion preventionD...

July 28, 2020 No Comments READ MORE +

Which of the following attacks can be mitigated by these configuration settings?

Analyze the screenshot below. Which of the following attacks can be mitigated by these configuration settings?A . A Denial-of-Service attack using network broadcastsB . A Replay attackC . An IP masquerading attackD . A MAC Flood attackView AnswerAnswer: D Explanation: Both BPDU Guard and Root Guard are used to prevent...

July 28, 2020 No Comments READ MORE +

On which layer of the OSI Reference Model does the FWSnort utility function?

On which layer of the OSI Reference Model does the FWSnort utility function?A . Physical LayerB . Data Link LayerC . Transport LayerD . Session LayerE . Application LayerView AnswerAnswer: C Explanation: The FWSnort utility functions as a transport layer inline IPS.

July 27, 2020 No Comments READ MORE +

When attempting to collect data from a suspected system compromise, which of the following should generally be collected first?

When attempting to collect data from a suspected system compromise, which of the following should generally be collected first?A . The network connections and open portsB . The contents of physical memoryC . The current routing tableD . A list of the running servicesView AnswerAnswer: B

July 26, 2020 No Comments READ MORE +

Which could be described as a Threat Vector?

Which could be described as a Threat Vector?A . A web server left6 unpatched and vulnerable to XSSB . A coding error allowing remote code executionC . A botnet that has infiltrated perimeter defensesD . A wireless network left open for anonymous useView AnswerAnswer: A Explanation: A threat vector is...

July 26, 2020 No Comments READ MORE +

Monitoring the transmission of data across the network using a man-in-the-middle attack presents a threat against which type of data?

Monitoring the transmission of data across the network using a man-in-the-middle attack presents a threat against which type of data?A . At-restB . In-transitC . PublicD . EncryptedView AnswerAnswer: B

July 24, 2020 No Comments READ MORE +

What is the purpose of this command?

At the start of an investigation on a Windows system, the lead handler executes the following commands after inserting a USB drive. What is the purpose of this command? C: >dir / s / a dhsra d: > a: IRCD.txtA . To create a file on the USB...

July 24, 2020 No Comments READ MORE +

Which of the following attacks would use “..” notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?

Which of the following attacks would use “..” notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?A . URL directoryB . HTTP header attackC . SQL injectionD . IDS evasionE . Cross site scriptingView AnswerAnswer: A

July 24, 2020 No Comments READ MORE +

What features and settings of Wireshark should be used to isolate and analyze this network traffic?

An internal host at IP address 10.10.50.100 is suspected to be communicating with a command and control whenever a user launches browser window. What features and settings of Wireshark should be used to isolate and analyze this network traffic?A . Filter traffic using ip.src = = 10.10.50.100 and tcp.srcport =...

July 23, 2020 No Comments READ MORE +

Which control was the first to fail?

A legacy server on the network was breached through an OS vulnerability with no patch available. The server is used only rarely by employees across several business units. The theft of information from the server goes unnoticed until the company is notified by a third party that sensitive information has...

July 23, 2020 No Comments READ MORE +