Which two options are recognized forms of phishing? (Choose two )

Which two options are recognized forms of phishing? (Choose two )A . spearB . whalingC . mailbombD . hookingE . mailnetView AnswerAnswer: AB

March 4, 2019 No Comments READ MORE +

Which term represents a weakness in a system that could lead to the system being compromised?

Which term represents a weakness in a system that could lead to the system being compromised?A . vulnerabilityB . threatC . exploitD . riskView AnswerAnswer: A

February 22, 2019 No Comments READ MORE +

In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?

In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?A . ACKB . SYN ACKC . RSTD . PSH, ACKView AnswerAnswer: C

February 21, 2019 No Comments READ MORE +

Which type of exploit normally requires the culprit to have prior access to the target system?

Which type of exploit normally requires the culprit to have prior access to the target system?A . local exploitB . denial of serviceC . system vulnerabilityD . remote exploitView AnswerAnswer: A

February 19, 2019 No Comments READ MORE +

Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?

Which protocol is expected to have NTP a user agent, host, and referrer headers in a packet capture?A . NTPB . HTTPC . DNSD . SSHView AnswerAnswer: B

February 19, 2019 No Comments READ MORE +

Which definition of a process in Windows is true?

Which definition of a process in Windows is true?A . running programB . unit of execution that must be manually scheduled by the applicationC . database that stores low-level settings for the OS and for certain applicationsD . basic unit to which the operating system allocates processor timeView AnswerAnswer: A

February 12, 2019 No Comments READ MORE +

Which definition of a fork in Linux is true?

Which definition of a fork in Linux is true?A . daemon to execute scheduled commandsB . parent directory name of a file pathnameC . macros for manipulating CPU setsD . new process created by a parent processView AnswerAnswer: D

February 11, 2019 No Comments READ MORE +

Which term represents a potential danger that could take advantage of a weakness in a system?

Which term represents a potential danger that could take advantage of a weakness in a system?A . vulnerabilityB . riskC . threatD . exploitView AnswerAnswer: C

January 30, 2019 No Comments READ MORE +

Which type of exploit normally requires the culprit to have prior access to the target system?

Which type of exploit normally requires the culprit to have prior access to the target system?A . local exploitB . denial of serviceC . system vulnerabilityD . remote exploitView AnswerAnswer: A

January 28, 2019 No Comments READ MORE +

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?A . Confidentiality, Integrity, and AvailabilityB . Confidentiality, Identity, and AvailabilityC . Confidentiality, Integrity, and AuthorizationD . Confidentiality, Identity, and AuthorizationView AnswerAnswer: A

January 28, 2019 No Comments READ MORE +