1. True or False? In asymmetric encryption, encryption and decryption use the same key. True False 2. What is an example of a symmetric encryption algorithm? Internet Key Exchange (IKE) Secure Socket Layer (SSL) Secure Shell (SSH) Advanced Encryption Standard (AES) 3. Which algorithm provides asymmetric encryption? Data …
1. What is the free service that is offered by the U.S. Department of Homeland Security? AIS CVE FireEye Helix Talos 2. What is a world leading threat intelligence team with a goal to help protect enterprise users, data, and infrastructure from active adversaries? AIS CVE FireEye Helix …
1. Which access control model is based on attributes of the object (resource) to be accessed, the subject (user) accessing the resource, and environmental factors regarding how the object is to be accessed, such as time of day? non-discretionary access control discretionary access control mandatory access control attribute-based …
1. What enables a threat actor to impersonate the default gateway and receive all traffic that is sent to hosts that are not on the local LAN segment? DNS tunneling cross-site scripting ARP cache poisoning iFrame attacks 2. What should a cybersecurity analyst look for to detect DNS …
1. Which attack exploits the three-way handshake? TCP reset attack UDP flood attack TCP SYN Flood attack DoS attack TCP session hijacking 2. Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both …
1. Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered. White Hat Gray Hat Black Hat 2. Which type of hacker is described in the scenario: …
1. Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication? Address Spoofing Attack Amplification and Reflection Attacks ICMP Attack MiTM Attack Session Hijacking 2. Which attack is being used when threat actors gain access …
1. What allows analysts to request and receive information about the operation of network devices? NetFlow SIEM SNMP Tcpdump Wireshark 2. What application captures frames that are saved in a file that contains the frame information, interface information, packet length, and time stamps? NetFlow SIEM SNMP Tcpdump Wireshark …
1. What is the weakest link in network security? reconnaissance access DoS social engineering 2. What type of attack is tailgating? reconnaissance access DoS social engineering 3. What type of attack is port scanning? reconnaissance access DoS social engineering 4. What is the weakest link in network security? …
1. What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network. trojan horse adware ransomware worm 2. What type of malware typically …