What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
A.
MAC is controlled by the discretion of the owner and DAC is controlled by an
administrator
B.
MAC is the strictest of all levels of control and DAC is object-based access
C.
DAC is controlled by the operating system and MAC is controlled by an administrator
D.
DAC is the strictest of all levels of control and MAC is object-based access
MAC is the strictest of all levels of control and DAC is object-based access
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
A.
NetScout
B.
tcpdump
C.
SolarWinds
D.
netsh
tcpdump
Which security principle is violated by running all processes as root or administrator?
A.
principle of least privilege
B.
role-based access control
C.
separation of duties
D.
trusted computing base
principle of least privilege
What are the two characteristics of the full packet captures? (Choose two.)
A.
Identifying network loops and collision domains.
B.
Troubleshooting the cause of security and performance issues.
C.
Reassembling fragmented traffic from raw data.
D.
Detecting common hardware faults and identify faulty assets.
E.
Providing a historical record of a network transaction.
Reassembling fragmented traffic from raw data.
Providing a historical record of a network transaction.
An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)
A.
signatures
B.
host IP addresses
C.
file size
D.
dropped files
E.
domain namesanalysis report shows that outbound callouts were made post infection.
host IP addresses
domain namesanalysis report shows that outbound callouts were made post infection.
Refer to the exhibit.
Which event is occurring?
A.
A binary named "submit" is running on VM cuckoo1.
B.
A binary is being submitted to run on VM cuckoo1
C.
A binary on VM cuckoo1 is being submitted for evaluation
D.
A URL is being evaluated to see if it has a malicious binary
A binary on VM cuckoo1 is being submitted for evaluation
What is the virtual address space for a Windows process?
A.
physical location of an object in memory
B.
Bset of pages that reside in the physical memory
C.
system-level memory protection feature built into the operating system
D.
set of virtual memory addresses that can be used
set of virtual memory addresses that can be used
What is the function of a command and control server?
A.
It enumerates open ports on a network device
B.
It drops secondary payload into malware
C.
It is used to regain control of the network after a compromise
D.
It sends instruction to a compromised system
It sends instruction to a compromised system
What is the practice of giving an employee access to only the resources needed to accomplish their job?
A.
principle of least privilege
B.
organizational separation
C.
separation of duties
D.
need to know principle
principle of least privilege
An analyst received an alert on their desktop computer showing that an attack was successful on the host.
After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the
reason for this discrepancy?
A.
The computer has a HIPS installed on it.
B.
The computer has a NIPS installed on it.
C.
The computer has a HIDS installed on it.
D.
The computer has a NIDS installed on it.
The computer has a HIDS installed on it.
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
A.
integrity
B.
confidentiality
C.
availability
D.
scope
integrity
How is attacking a vulnerability categorized?
A.
action on objectives
B.
delivery
C.
exploitation
D.
insta
exploitation
Page 3 out of 34 Pages |
Previous |