What is the term commonly used to refer to a technique of authentication one machine to another by forging packets from a trusted source?
What is the term commonly used to refer to a technique of authentication one machine to another by forging packets from a trusted source?A . SmurfingB . Man-in-the-Middle (MITM) attackC . Session redirectD . SpoofingView AnswerAnswer: D
Which Identity and Access Management (IAM) process can be used to maintain the principle of least privilege?
Which Identity and Access Management (IAM) process can be used to maintain the principle of least privilege?A . identity provisioningB . access recoveryC . multi-factor authentication (MFA)D . user access reviewView AnswerAnswer: A
A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?
A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?A . Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)B . Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)C . Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)D ....
In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?
In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?A . Physical LayerB . Application LayerC . Data-Link LayerD . Network LayerView AnswerAnswer: A
Intellectual property rights are PRIMARY concerned with which of the following?
Intellectual property rights are PRIMARY concerned with which of the following?A . Owner’s ability to realize financial gainB . Owner’s ability to maintain copyrightC . Right of the owner to enjoy their creationD . Right of the owner to control delivery methodView AnswerAnswer: D
Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?
Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?A . Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.B . Maintaining segregation of duties.C . Standardized configurations...
Which of the following is the BEST reason for writing an information security policy?
Which of the following is the BEST reason for writing an information security policy?A . To support information security governanceB . To reduce the number of audit findingsC . To deter attackersD . To implement effective information security controlsView AnswerAnswer: A
Which of the following would MINIMIZE the ability of an attacker to exploit a buffer overflow?
Which of the following would MINIMIZE the ability of an attacker to exploit a buffer overflow?A . Memory reviewB . Code reviewC . Message divisionD . Buffer divisionView AnswerAnswer: B
Which of the following is the BEST way to prevent future occurrences?
An organization has discovered that users are visiting unauthorized websites using anonymous proxies. Which of the following is the BEST way to prevent future occurrences?A . Remove the anonymity from the proxyB . Analyze Internet Protocol (IP) traffic for proxy requestsC . Disable the proxy server on the firewallD ....
In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?
In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?A . The second of two routers can periodically check in to make sure that the first router is operational.B . The second of two routers can...