1. Which of the following spreads malware-infected files and creates vulnerabilities on a network? ACL Encryption Tunneling NAT/Pat P2P== 2. Which of the following can be defeated by packets containing spoofed IP addresses? P2P TOR ACL encryption NAT/PAT 3. Which of the following makes message contents and file …
1. Which of the following can carry malware payloads into the network? DNS HTTPS IMAP syslog SMTP 2. Which of the following presents challenges to decoding packet captures? HTTPS DNS SMTP syslog NTP 3. Which of the following can be used to exfiltrate data hidden in the query …
1. During which stage would you develop and implement the appropriate activities to take action regarding a detected cybersecurity event? Detect Identify Protect Recover Respond 2. During which stage would you develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or …
1. Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations? Asset management Configuration management Enterprise patch management Mobile device management Vulnerability management 2. Which device management activity addresses the inventory and control of hardware and software configurations? …
1. Which risk response accepts the risk and its consequences? Risk avoidance Risk reduction Risk retention Risk sharing 2. Which risk response outsources some of the risk to other parties, such as Security as a Service? Risk avoidance Risk reduction Risk retention Risk sharing 3. Which risk response …
1. Which CVSS metric captures the level of access that is required for a successful exploit of the vulnerability? Attack complexity Attack vector Privileges required Scope User interaction 2. Which CVSS metric expresses the number of components, software, hardware, or networks, that are beyond the attacker’s control and …
1. What refers to the amount of data passing from a given source to a given destination in a given period of time? Asset value Critical asset address space Ports used Session duration Total throughput 2. What is the term for the time between the establishment of a …
1. What allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules? Policy-based strategy nftables iptables Windows Firewall Windows Defender Firewall 2. Which of the following uses a profile-based approach to configuring firewall functionality? iptables Windows firewall Policy-based strategy TCP …
1. True or False? Endpoints are hosts on the network that can access or be accessed by other hosts on the network. True False 2. Which type of antimalware software recognizes various characteristics of known malware files? heuristics-based signature-based behavior-based safe browsing-based 3. Which type of endpoint protection …
1. True or False? In asymmetric encryption, encryption and decryption use the same key. True False 2. What is an example of a symmetric encryption algorithm? Internet Key Exchange (IKE) Secure Socket Layer (SSL) Secure Shell (SSH) Advanced Encryption Standard (AES) 3. Which algorithm provides asymmetric encryption? Data …