What is kept in the following directory? HKLMSECURITYPolicySecrets

What is kept in the following directory? HKLMSECURITYPolicySecretsA . Cached password hashes for the past 20 usersB . Service account passwords in plain textC . IAS account names and passwordsD . Local store PKI Kerberos certificatesView AnswerAnswer: B

November 5, 2021 No Comments READ MORE +

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.A . blackout attackB . automated attackC . distributed attackD . central processing attackView AnswerAnswer: B

November 5, 2021 No Comments READ MORE +

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

When examining the log files from a Windows IIS Web Server, how often is a new log file created?A . the same log is used at all timesB . a new log file is created everydayC . a new log file is created each weekD . a new log is...

November 5, 2021 No Comments READ MORE +

What has happened?

You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your...

November 4, 2021 No Comments READ MORE +

Which of the following are you most interested in when trying to trace the source of the message?

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source . Which of the following are you most interested in when trying to trace the source of the message?A . The X509 AddressB . The SMTP reply AddressC ....

November 4, 2021 No Comments READ MORE +

In the context of file deletion process, which of the following statement holds true?

In the context of file deletion process, which of the following statement holds true?A . When files are deleted, the data is overwritten and the cluster marked as availableB . The longer a disk is in use, the less likely it is that deleted files will be overwrittenC . While...

November 4, 2021 No Comments READ MORE +

Why would a scanner like Nessus is not recommended in this situation?

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan . Why would a scanner like Nessus is not recommended in this situation?A . Nessus is too loudB . Nessus...

November 3, 2021 No Comments READ MORE +

What is he testing at this point?

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command . What is he testing at this point? #include #include int main(int argc, char...

November 3, 2021 No Comments READ MORE +

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.A . Network ForensicsB . Computer ForensicsC . Incident ResponseD . Event ReactionView AnswerAnswer: B

November 3, 2021 No Comments READ MORE +

What is the target host IP in the following command?

What is the target host IP in the following command?A . 172.16.28.95B . 10.10.150.1C . Firewalk does not scan target hostsD . This command is using FIN packets, which cannot scan target hostsView AnswerAnswer: A

November 3, 2021 No Comments READ MORE +