Which string matches the regular expression r(ege)+x?

Which string matches the regular expression r(ege)+x?A . rxB . regeegexC . r(ege)xD . rege+xView AnswerAnswer: B

March 29, 2018 No Comments READ MORE +

Which source provides reports of vulnerabilities in software and hardware to a Security Operations Center?

Which source provides reports of vulnerabilities in software and hardware to a Security Operations Center?A . Analysis CenterB . National CSIRTC . Internal CSIRTD . Physical SecurityView AnswerAnswer: C

March 27, 2018 No Comments READ MORE +

Which of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?

Which of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?A . CSIRTB . ICASIC . USIRPD . PSIRTView AnswerAnswer: D

March 22, 2018 No Comments READ MORE +

What is Data mapping used for? (Choose two)

What is Data mapping used for? (Choose two)A . data accuracy (integrity)B . data availabilityC . data normalizationD . data confidentialityE . data visualisationView AnswerAnswer: AE

March 20, 2018 No Comments READ MORE +

Which of the following is an example of a coordination center?

Which of the following is an example of a coordination center?A . Cisco PSIRTB . Microsoft MSRCC . CERT division of the Software Engineering Institute (SEI)D . FIRSTView AnswerAnswer: C

March 17, 2018 No Comments READ MORE +

Which regular expression matches "color" and "colour"?

Which regular expression matches "color" and "colour"?A . col[0-9]+ourB . colo?urC . colou?rD . ]a-z]{7}View AnswerAnswer: C

March 10, 2018 No Comments READ MORE +

According to NIST 86, which action describes the volatile data collection?

According to NIST 86, which action describes the volatile data collection?A . Collect data before rebootingB . Collect data while rebootingC . Collect data after rebootingD . Collect data that contains malwareView AnswerAnswer: A

March 9, 2018 No Comments READ MORE +

Which of the following statements is true about this packet capture?

Refer to the following packet capture. 00:00:04.549138 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq 3152949738, win 29200, options [mss 1460,sackOK,TS val 1193148797 ecr 0,nop,wscale 7], length 0 00:00:05.547084 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq 3152949738, win 29200, options [mss 1460,sackOK,TS val 1193149047 ecr 0,nop,wscale 7], length 0 00:00:07.551078 IP...

March 7, 2018 No Comments READ MORE +

Which type of intrusion event is an attacker retrieving the robots. txt file from target site?

Which type of intrusion event is an attacker retrieving the robots. txt file from target site?A . exploitationB . weaponizationC . scanningD . reconnaissanceView AnswerAnswer: D

March 5, 2018 No Comments READ MORE +

Which network device creates and sends the initial packet of a session?

Which network device creates and sends the initial packet of a session?A . sourceB . originationC . destinationD . networkView AnswerAnswer: A

February 26, 2018 No Comments READ MORE +