What is a network tap?
What is a network tap? a Cisco technology that provides statistics on packets flowing through a router or multilayer switch a passive device that forwards all traffic and physical layer…
What is a network tap? a Cisco technology that provides statistics on packets flowing through a router or multilayer switch a passive device that forwards all traffic and physical layer…
What are two properties of a cryptographic hash function? (Choose two.) The hash function is one way and irreversible. The input for a particular hash algorithm has to have a…
Which two statements describe the characteristics of symmetric algorithms? (Choose two.) They provide confidentiality, integrity, and availability. They are commonly used with VPN traffic. They use a pair of a…
A technician needs to verify file permissions on a specific Linux file. Which command would the technician use? sudo cd vi ls -l Explanation & Hint: To verify file permissions…
What are three functions provided by the syslog service? (Choose three.) to gather logging information for monitoring and troubleshooting to provide statistics on packets that are flowing through a Cisco…
Refer to the exhibit. What solution can provide a VPN between site A and site B to support encapsulation of any Layer 3 protocol between the internal networks at each…
What are two evasion techniques that are used by hackers? (Choose two.) phishing Trojan horse reconnaissance rootkit pivot Answers Explanation & Hints: The following methods are used by hackers to…
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log…
Match the Windows 10 Registry key with its description. (Not all options are used.) Explanation & Hint: HKEY_CLASSES_ROOT (HKCR): Contains settings about the file system, file associations, shortcuts used when…
What is a property of the ARP table on a device? Every operating system uses the same timer to remove old entries from the ARP cache. Entries in an ARP…
What best describes the security threat of spoofing? sending bulk email to individuals, lists, or domains with the intention to prevent users from accessing email intercepting traffic between two hosts…
What are the three core functions provided by the Security Onion? (Choose three.) business continuity planning alert analysis security device management threat containment intrusion detection full packet capture Answers Explanation…
Match the alert classification with the description. Explanation & Hint: True Positive: Malicious traffic is correctly identified as a threat. This means the system accurately detected actual malicious activity. False…
A network administrator is configuring an AAA server to manage RADIUS authentication. Which two features are included in RADIUS authentication? (Choose two.) single process for authentication and authorization separate processes…
Which term is used to describe the process of identifying the NSM-related data to be gathered? data archiving data normalization data reduction data retention Explanation & Hint: The term used…
Which tool included in the Security Onion is a series of software plugins that send different types of data to the Elasticsearch data stores? OSSEC Curator Beats ElastAlert Explanation &…
What information is required for a WHOIS query? outside global address of the client FQDN of the domain ICANN lookup server address link-local address of the domain owner Explanation &…
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications? SMB DHCP HTTP SMTP Answers Explanation & Hints: SMB is used in Microsoft networking for…
Which two network protocols can be used by a threat actor to exfiltrate data in traffic that is disguised as normal network traffic? (Choose two.) syslog DNS SMTP NTP HTTP…
What are the two ways threat actors use NTP? (Choose two.) Threat actors use NTP systems to direct DDoS attacks. They place iFrames on a frequently used corporate web page.…