Which of the following is true when describing threat intelligence?

Which of the following is true when describing threat intelligence? Question: Which of the following is true when describing threat intelligence? Options: Threat intelligence’s primary purpose is to make money by exploiting threats. Threat intelligence’s primary purpose is to inform business decisions regarding the risks and implications associated with threats. With threat intelligence, threat actors … Read more

What is one method of understanding how malware operates?

What is one method of understanding how malware operates? Question: What is one method of understanding how malware operates? Options: deep packet analysis review logging data compare attacks with known techniques reverse engineer software Correct Answer The Correct Answer for this Question is reverse engineer software

What type of IP attack features a simultaneous, coordinated attack from multiple source machines?

What type of IP attack features a simultaneous, coordinated attack from multiple source machines? Question: What type of IP attack features a simultaneous, coordinated attack from multiple source machines? Options: rogue DHCP attack DDoS attack MITM attack MAC address flooding attack Correct Answer The Correct Answer for this Question is DDoS attack

What must a user do when making any changes to the logging configuration?

What must a user do when making any changes to the logging configuration? Question: What must a user do when making any changes to the logging configuration? Options: reboot the server restart the logging service nothing at all reset the network connection Correct Answer The Correct Answer for this Question is restart the logging service

When are “point-in-time detection technologies” considered useless?

When are “point-in-time detection technologies” considered useless? Question: When are “point-in-time detection technologies” considered useless? Options: after the attacker has compromised the Internet-facing firewall appliance when a malicious file is not caught, or is self-morphing after entering the environment when the IPS appliance detects an anomaly. when forensics are performed on the malicious payload to … Read more

What is an advantage to using HTTPS?

What is an advantage to using HTTPS? Question: What is an advantage to using HTTPS? Options: Performance and data retrieval is faster. Traffic is encrypted between the client and the server. HTTPS works with multiple websites. Traffic cannot be inspected by firewall and IPS. Correct Answer The Correct Answer for this Question is Traffic is … Read more

Which of the following is a password system that’s based on tokens and uses a challenge-response mechanism?

Which of the following is a password system that’s based on tokens and uses a challenge-response mechanism? Question: Which of the following is a password system that’s based on tokens and uses a challenge-response mechanism? Options: Synchronous token system Asynchronous token system One-time token system Time-base token system Correct Answer The Correct Answer for this … Read more

What are two examples of common database platforms that are used on Linux devices?

What are two examples of common database platforms that are used on Linux devices? (Choose two.) Question: What are two examples of common database platforms that are used on Linux devices? Options: MySQL WinSQL SQL-lite NoSQL Correct Answer The Correct Answer for this Question is MySQL NoSQL

What are two reasons that AAA server logs are useful in protecting the network and users?

What are two reasons that AAA server logs are useful in protecting the network and users? (Choose two.) Question: What are two reasons that AAA server logs are useful in protecting the network and users? Options: Due to the nature of AAA logging, AAA server logs always indicate actual attack attempts. Most AAA server log … Read more

What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim’s IP address?

What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim’s IP address? Question: What type of attack occurs when the attacker spoofs the IP address of … Read more