At which layer is deep packet inspection investigated on a firewall?
At which layer is deep packet inspection investigated on a firewall?A . internetB . transportC . applicationD . data linkView AnswerAnswer: C
At which layer is deep packet inspection investigated on a firewall?A . internetB . transportC . applicationD . data linkView AnswerAnswer: C
Which utility blocks a host portscan?A . HIDSB . sandboxingC . host-based firewallD . antimalwareView AnswerAnswer: C
What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?A . least privilegeB . need to knowC . integrity validationD . due diligenceView AnswerAnswer: A
Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?A . 2317B . 1986C . 2318D . 2542View AnswerAnswer: D
DRAG DROP Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.View AnswerAnswer:
Which event artifact is used to identify HTTP GET requests for a specific file?A . destination IP addressB . URIC . HTTP status codeD . TCP ACKView AnswerAnswer: B
Which two components reduce the attack surface on an endpoint? (Choose two.)A . secure bootB . load balancingC . increased audit log levelsD . restricting USB portsE . full packet captures at the endpointView...
DRAG DROP Drag and drop the access control models from the left onto the correct descriptions on the right.View AnswerAnswer:
Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)A . UDP port to which the traffic is destinedB . TCP port from which the traffic was sourcedC . source...
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?A . examinationB . investigationC . collectionD . reportingView AnswerAnswer: C