Which regular expression matches "color" and "colour"?
A.
colo?ur
B.
col[08]+our
C.
colou?r
D.
col[09]+our
colou?r
Which event is user interaction?
A.
gaining root access
B.
executing remote code
C.
reading and writing file permission
D.
opening a malicious file
opening a malicious file
How does certificate authority impact a security system?
A.
It authenticates client identity when requesting SSL certificate
B.
It validates domain identity of a SSL certificate
C.
It authenticates domain identity when requesting SSL certificate
D.
It validates client identity when communicating with the server
It validates domain identity of a SSL certificate
What is a benefit of agent-based protection when compared to agentless protection?
A.
It lowers maintenance costs
B.
It provides a centralized platform
C.
It collects and detects all traffic locally
D.
It manages numerous devices simultaneously
It provides a centralized platform
A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format. Which type of evidence is this file?
A.
CD data copy prepared in Windows
B.
CD data copy prepared in Mac-based system
C.
CD data copy prepared in Linux system
D.
CD data copy prepared in Android-based system
CD data copy prepared in Windows
What is an example of social engineering attacks?
A.
A. receiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company
B.
receiving an email from human resources requesting a visit to their secure website to update contact information
C.
sending a verbal request to an administrator who knows how to change an account password
D.
receiving an invitation to the department’s weekly WebEx meeting
receiving an email from human resources requesting a visit to their secure website to update contact information
Which utility blocks a host portscan?
A.
HIDS
B.
sandboxing
C.
host-based firewall
D.
antimalware
host-based firewall
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
A.
examination
B.
investigation
C.
collection
D.
reporting
collection
What is the difference between a threat and a risk?
A.
Threat represents a potential danger that could take advantage of a weakness in a system
B.
Risk represents the known and identified loss or danger in the system
C.
Risk represents the nonintentional interaction with uncertainty in the system
D.
Threat represents a state of being exposed to an attack or a compromise either
physically or logically
Threat represents a potential danger that could take advantage of a weakness in a system
A system administrator is ensuring that specific registry information is accurate.
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?
A.
file extension associations
B.
hardware, software, and security settings for the system
C.
currently logged in users, including folders and control panel settings
D.
all users on the system, including visual settings
hardware, software, and security settings for the system
Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?
A.
ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
B.
ClientStart, TLS versions it supports, cipher-suites it supports, and suggested
compression methods
C.
ClientHello, TLS versions it supports, cipher-suites it supports, and suggested
compression methods
D.
ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
ClientHello, TLS versions it supports, cipher-suites it supports, and suggested
compression methods
Which evasion technique is a function of ransomware?
A.
extended sleep calls
B.
encryption
C.
resource exhaustion
D.
encoding
encryption
Page 9 out of 34 Pages |
Previous |