Which of the following tools is an open source network intrusion prevention and detection system that works network sniffer and record the operation of the network, which is coordinated pre-signatures?
#151
Answer: A✅ Correct❌ Incorrect
Which of the following firewalls are used to monitor the status of active connections, and configure the network packets to pass through the firewall? Each correct answer represents a complete solution. Choose all that apply.
#152
Answer: CD✅ Correct❌ Incorrect
Which of the following conditions cannot enter the system ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
#153
Answer: D✅ Correct❌ Incorrect
You are Network Administrator Investment Bank. You're worried about people breeching network and can steal information before you can detect and shut down access. Which of the following is the best way to deal with this issue?
#154
Answer: C✅ Correct❌ Incorrect
Which of the following steps OPSEC process examines every aspect of the proposed operation to identify the OPSEC indicators that can reveal important information and then compare them with indicators of the opponent's intelligence collection capabilities identified in the previous activity?
#155
Answer: E✅ Correct❌ Incorrect
Which of the following refers to a potential occurrence of an undesired event that can eventually damage and interrupt the operational and functional activities of an organization?
#156
Answer: C✅ Correct❌ Incorrect
Which of the following statement holds true in terms of containers?
#157
Answer: C✅ Correct❌ Incorrect
Byron, a new network administrator at FBI, would like to ensure that Windows PCs there are up-to-date and have less internal security flaws. What can he do?
#158
Answer: C✅ Correct❌ Incorrect
Which BC/DR activity includes action taken toward resuming all services that are dependent on business-critical applications?
#159
Answer: B✅ Correct❌ Incorrect
If an organization has decided to consume PaaS Cloud service model, then identify the organization's responsibility that they need to look after based on shared responsibility model.
#160
Answer: A✅ Correct❌ Incorrect
Which of the following protocols is used for E-mail?
#161
Answer: D✅ Correct❌ Incorrect
Which of the following is a Cisco product that performs VPN and firewall functions?
#162
Answer: B✅ Correct❌ Incorrect
Which of the following representatives of the incident response team takes forensic backups of systems that are the focus of an incident?
#163
Answer: A✅ Correct❌ Incorrect
Which of the following is a centralized collection of honeypots and analysis tools?
#164
Answer: D✅ Correct❌ Incorrect
Which of the following tools scans the network systems for well-known and often exploited vulnerabilities?
#165
Answer: A✅ Correct❌ Incorrect
Which of the following tools examines a system for a number of known weaknesses and alerts the administrator?
#166
Answer: B✅ Correct❌ Incorrect
Which of the following is the full form of SAINT?
#167
Answer: B✅ Correct❌ Incorrect
Which of the following is a type of VPN that involves a single VPN gateway?
#168
Answer: A✅ Correct❌ Incorrect
Which of the following is a free security-auditing tool for Linux?
#169
Answer: C✅ Correct❌ Incorrect
Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?
#170
Answer: A✅ Correct❌ Incorrect
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
#171
Answer: AC✅ Correct❌ Incorrect
Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?
#172
Answer: A✅ Correct❌ Incorrect
Which of the following is an example of MAC model?
#173
Answer: D✅ Correct❌ Incorrect
Which of the following things need to be identified during attack surface visualization?
#174
Answer: D✅ Correct❌ Incorrect
Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?
#175
Answer: D✅ Correct❌ Incorrect
Docker provides Platform-as-a-Service (PaaS) through ________ and delivers containerized software packages.
#176
Answer: C✅ Correct❌ Incorrect
Mark is monitoring the network traffic on his organization's network. He wants to detect TCP and UDP ping sweeps on his network. Which type of filter will be used to detect this?
#177
Answer: D✅ Correct❌ Incorrect
Which of the following creates passwords for individual administrator accounts and stores them in Windows AD?
#178
Answer: D✅ Correct❌ Incorrect
Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:
#179
Answer: C✅ Correct❌ Incorrect
Which filter to locate unusual ICMP request an Analyst can use in order to detect a ICMP probes from the attacker to a target OS looking for the response to perform ICMP based fingerprinting?