Which term describes the act of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?

Which term describes the act of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?A . authentication tunnelingB . administrative abuseC . rights exploitationD . privilege escalationView AnswerAnswer: D

August 27, 2018 No Comments READ MORE +

Which encryption algorithm is the strongest?

Which encryption algorithm is the strongest?A . AESB . CESC . DESD . 3DESView AnswerAnswer: A

August 26, 2018 No Comments READ MORE +

According to RFC 1035 which transport protocol is recommended for use with DNS queries?

According to RFC 1035 which transport protocol is recommended for use with DNS queries?A . Transmission Control ProtocolB . Reliable Data ProtocolC . Hypertext Transfer ProtocolD . User Datagram ProtocolView AnswerAnswer: D

August 25, 2018 No Comments READ MORE +

Which definition of permissions in Linux is true?

Which definition of permissions in Linux is true?A . rules that allow network traffic to go in and outB . table maintenance programC . written affidavit that you have to sign before using the systemD . attributes of ownership and control of an objectView AnswerAnswer: D

August 24, 2018 No Comments READ MORE +

Which security monitoring data type is associated with application server logs?

Which security monitoring data type is associated with application server logs?A . alert dataB . statistical dataC . session dataD . transaction dataView AnswerAnswer: D

August 20, 2018 No Comments READ MORE +

Which hashing algorithm is the least secure?

Which hashing algorithm is the least secure?A . MD5B . RC4C . SHA-3D . SHA-2View AnswerAnswer: A

August 16, 2018 No Comments READ MORE +

Which option is an advantage to using network-based anti-virus versus host-based anti-virus?

Which option is an advantage to using network-based anti-virus versus host-based anti-virus?A . Network-based has the ability to protect unmanaged devices and unsupported operating systems.B . There are no advantages compared to host-based antivirus.C . Host-based antivirus does not have the ability to collect newly created signatures.D . Network-based can...

August 15, 2018 No Comments READ MORE +

Which two actions are valid uses of public key infrastructure? (Choose two )

Which two actions are valid uses of public key infrastructure? (Choose two )A . ensuring the privacy of a certificateB . revoking the validation of a certificateC . validating the authenticity of a certificateD . creating duplicate copies of a certificateE . changing ownership of a certificateView AnswerAnswer: BC

August 14, 2018 No Comments READ MORE +

Which term represents a weakness in a system that could lead to the system being compromised?

Which term represents a weakness in a system that could lead to the system being compromised?A . vulnerabilityB . threatC . exploitD . riskView AnswerAnswer: A

August 12, 2018 No Comments READ MORE +

Which encryption algorithm is the strongest?

Which encryption algorithm is the strongest?A . AESB . CESC . DESD . 3DESView AnswerAnswer: A

August 10, 2018 No Comments READ MORE +