ITIL represents best practice
ITIL represents best practiceA . All of the aboveB . 1 and 3 onlyC . 1 and 2 onlyD . 2 and 3 onlyView AnswerAnswer: A
What is a key feature of Application Visibility and Control?
What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D
What kind of attack does the above scenario depict?
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public...
Another name for "covered" person is ________.
Another name for "covered" person is ________.A . guardianB . none of these answersC . ombudsmanD . access personE . fiduciaryF . supervisorView AnswerAnswer: D Explanation: Access or covered persons have knowledge of pending or actual investment recommendations or action. The firm's definition of access (covered) person should be broad...
What should you do?
You have a server named Server1 that runs Windows Server 2016. Server1 is a Hyper-V host that hosts a virtual machine named VM1. Server1 has three network adapter cards that are connected to virtual switches named vSwitch1, vSwitch2 and vSwitch3. You configure NIC Teaming on VM1 as shown in the...
Which action can help improve query performance?
A streaming application is reading data from Amazon Kinesis Data Streams and immediately writing the data to an Amazon S3 bucket every 10 seconds. The application is reading data from hundreds of shards. The batch interval cannot be changed due to a separate requirement. The data is being accessed by...
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?A . NmapB . HpingC . NetRangerD . PSADView AnswerAnswer: D Explanation: PSAD is a tool that runs on the Windows OS and analyzes iptables...
An SMTP integration allows you to forward audit records to a monitoring solution.
An SMTP integration allows you to forward audit records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: B
What is the fastest way she can accomplish this with Nmap?
Trinity needs to scan all hosts on a /16 network for TCP port 445 only. What is the fastest way she can accomplish this with Nmap? Stealth is not a concern.A . nmap -sn -sF 10.1.0.0/16 445B . nmap -p 445 -n -T4 Copen 10.1.0.0/16C . nmap -s 445 -sU...
What should Bob do to avoid this problem?
Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. He identified this when the IDS alerted for malware...