Which of the following is an open source feed for threat data?
Which of the following is an open source feed for threat data?A . Cyber Squad ThreatConnectB . BAE Detica CyberRevealC . MITRE CRITsD . Cisco AMP Threat GridView AnswerAnswer: C
Which of the following is an open source feed for threat data?A . Cyber Squad ThreatConnectB . BAE Detica CyberRevealC . MITRE CRITsD . Cisco AMP Threat GridView AnswerAnswer: C
Which two statements are true about Windows operating systems? (Choose two.)A . Windows operating systems are used exclusively for desktop computing.B . Windows server platforms offer numerous services.C . Some Windows operating systems support...
What is an advantage of using OSPF instead of RIPv2?A . It does not have the problem of count to infinity.B . OSPF has a higher hop-count value.C . OSPF includes bandwidth information in...
Which one of the following best describes the output that the netstat command displays?A . all the active mapped network drivesB . all the active connected users on the deviceC . all the active...
A user on your network receives an email in their mailbox that contains a malicious attachment. There is no indication that the file was run. Which category as defined in the Diamond Model of...
What is the main advantage of using a mandatory access control (MAC) model instead of a discretionary access control (DAC) model?A . MAC is more secure because the operating system ensures security policy compliance.B...
Malware that can corrupt the virtual memory space of another process can alter the content of which two resources? (Choose two.)A . another process's content stored in the RAMB . another process's content stored...
Which one of the following command strings are correct Snort rules?A . alert tcp any any (msg:"IDS Rule 5 Triggered");B . drop udp 10.40.1.74 anyany any (content: "root"; nocase; msg:"UDP not allowed");C . pass...
Which protocol or diagnostic tool helps you determine how many hops away a network is and can be exploited by an attacker?A . SSHB . tracerouteC . pingD . TCPView AnswerAnswer: B
Which of the following best describes a timing attack?A . Sending a ton of traffic to render the system or data uselessB . Sending traffic in a method that is slower than the system...