1. What term is used to describe the intelligence demonstrated by machines? machine learning natural intelligence artificial intelligence IBN 2. What is artificial intelligence? the ability of a device to “learn” based on code and provided data the intersection of innovation and society the gathering of data from …
1. To ensure that the chain of custody is maintained, what three items should be logged about evidence that is collected and analyzed after a security incident has occurred? (Choose three.) measures used to prevent an incident extent of the damage to resources and assets serial numbers and …
1. When real-time reporting of security events from multiple sources is being received, which function in SIEM provides capturing and processing of data in a common format? normalization compliance log collection aggregation 2. What is the value of file hashes to network security investigations? They can serve as …
1. What classification is used for an alert that correctly identifies that an exploit has occurred? false negative true positive true negative false positive 2. Which type of analysis relies on predefined conditions and can analyze applications that only use well-known fixed ports? deterministic probabilistic log statistical 3. …
1. What is a feature of the tcpdump tool? It records metadata about packet flows. It uses agents to submit host logs to centralized management servers. It can display packet captures in real time or write them to a file. It provides real-time reporting and long-term analysis of …
1. A cyberanalyst is reviewing an entry-point ACL. What three types of ICMP traffic should be allowed to access an internal network from the internet? (Choose three.) destination unreachable time exceeded ping request reply squelch 2. A company decides to purchase a device capable of managing load balancing …
1. In profiling a server, what defines what an application is allowed to do or run on a server? software environment service accounts user accounts listening ports 2. Which metric class in the CVSS Basic Metric Group identifies the impacts on confidentiality, integrity, and availability? Impact Exploit Code …
1. Which antimalware software approach can recognize various characteristics of known malware files to detect a threat? heuristics-based routing-based behavior-based signature-based 2. In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location? safe browsing intrusion detection and prevention …
1. Which statement describes the Software-Optimized Encryption Algorithm (SEAL)? SEAL is a stream cipher. It is an example of an asymmetric algorithm. It requires more CPU resources than software-based AES does. It uses a 112-bit encryption key. 2. Which statement is a feature of HMAC? HMAC is based …
1. Which service is provided by the Cisco Talos Group? collecting information about active, existing, and emerging threats preventing online malware from affecting end user devices preventing viruses from affecting end user devices scanning updates for malware code 2. What does the MITRE Corporation create and maintain? IOC …