1. What Windows security level is logged when a remote login was unsuccessfully attempted by an unauthorized user? Error Fatal Warning Information Success Audit Failure Audit 2. What Windows security level is logged when a process that is required has successfully loaded on a workstation? Error Fatal Warning …
1. Which type of network monitoring data includes detailed protocol and payload information for all traffic on a network segment? full-packet capture transaction data session data alert data extracted content statistical data 2. What type of network monitoring data summarizes or analyzes network flow or performance data? full-packet …
1. Which of the following spreads malware-infected files and creates vulnerabilities on a network? ACL Encryption Tunneling NAT/Pat P2P== 2. Which of the following can be defeated by packets containing spoofed IP addresses? P2P TOR ACL encryption NAT/PAT 3. Which of the following makes message contents and file …
1. Which of the following can carry malware payloads into the network? DNS HTTPS IMAP syslog SMTP 2. Which of the following presents challenges to decoding packet captures? HTTPS DNS SMTP syslog NTP 3. Which of the following can be used to exfiltrate data hidden in the query …
1. During which stage would you develop and implement the appropriate activities to take action regarding a detected cybersecurity event? Detect Identify Protect Recover Respond 2. During which stage would you develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or …
1. Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations? Asset management Configuration management Enterprise patch management Mobile device management Vulnerability management 2. Which device management activity addresses the inventory and control of hardware and software configurations? …
1. Which risk response accepts the risk and its consequences? Risk avoidance Risk reduction Risk retention Risk sharing 2. Which risk response outsources some of the risk to other parties, such as Security as a Service? Risk avoidance Risk reduction Risk retention Risk sharing 3. Which risk response …
1. Which CVSS metric captures the level of access that is required for a successful exploit of the vulnerability? Attack complexity Attack vector Privileges required Scope User interaction 2. Which CVSS metric expresses the number of components, software, hardware, or networks, that are beyond the attacker’s control and …
1. What refers to the amount of data passing from a given source to a given destination in a given period of time? Asset value Critical asset address space Ports used Session duration Total throughput 2. What is the term for the time between the establishment of a …
1. What allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules? Policy-based strategy nftables iptables Windows Firewall Windows Defender Firewall 2. Which of the following uses a profile-based approach to configuring firewall functionality? iptables Windows firewall Policy-based strategy TCP …