Which type of evidence supports an assertion based on previously obtained evidence?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of evidence supports an assertion based on previously obtained evidence? best evidence corroborating evidence direct evidence indirect evidence Answers Explanation & Hints: Corroborating evidence is evidence that supports…

Continue ReadingWhich type of evidence supports an assertion based on previously obtained evidence?

Which two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.) SSL traffic STP traffic IPsec traffic routing updates traffic Windows security auditing…

Continue ReadingWhich two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.)

What are two elements that form the PRI value in a syslog message? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two elements that form the PRI value in a syslog message? (Choose two.) facility header severity hostname timestamp Answers Explanation & Hints: The PRI in a syslog message…

Continue ReadingWhat are two elements that form the PRI value in a syslog message? (Choose two.)

Which three pieces of information are found in session data? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which three pieces of information are found in session data? (Choose three.) user name source and destination port numbers Layer 4 transport protocol source and destination IP addresses source and…

Continue ReadingWhich three pieces of information are found in session data? (Choose three.)

What are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.) attack vector availability confidentiality exploit integrity remediation level Answers Explanation & Hints: The Common…

Continue ReadingWhat are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.)

A network administrator is creating a network profile to generate a network baseline. What is included in the critical asset address space element?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network administrator is creating a network profile to generate a network baseline. What is included in the critical asset address space element? the list of TCP or UDP processes…

Continue ReadingA network administrator is creating a network profile to generate a network baseline. What is included in the critical asset address space element?

Which statement describes the anomaly-based intrusion detection approach?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which statement describes the anomaly-based intrusion detection approach? It compares the operations of a host against a well-defined security policy. It compares the signatures of incoming traffic to a known…

Continue ReadingWhich statement describes the anomaly-based intrusion detection approach?

Match the description to the antimalware approach. (Not all options are used.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Match the description to the antimalware approach. (Not all options are used.) Answers Explanation & Hints: Antimalware programs may detect viruses using three different approaches: signature-based - by recognizing various…

Continue ReadingMatch the description to the antimalware approach. (Not all options are used.)

Which three algorithms are designed to generate and verify digital signatures? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which three algorithms are designed to generate and verify digital signatures? (Choose three.) IKE AES DSA RSA 3DES ECDSA Answers Explanation & Hints: There are three Digital Signature Standard (DSS)…

Continue ReadingWhich three algorithms are designed to generate and verify digital signatures? (Choose three.)

A network administrator is configuring an AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator is configuring an AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.) encryption for only the password of a user encryption…

Continue ReadingA network administrator is configuring an AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.)

A network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center and sends an immediate alert if any file is modified. Which aspect of secure communications is addressed by this security measure?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center and sends an immediate alert if any file…

Continue ReadingA network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center and sends an immediate alert if any file is modified. Which aspect of secure communications is addressed by this security measure?

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data? statement of scope statement of authority Internet access policy acceptable…

Continue ReadingWhich section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

A flood of packets with invalid source IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack has occurred?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A flood of packets with invalid source IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of…

Continue ReadingA flood of packets with invalid source IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack has occurred?

What kind of ICMP message can be used by threat actors to perform network reconnaissance and scanning attacks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What kind of ICMP message can be used by threat actors to perform network reconnaissance and scanning attacks? ICMP redirects ICMP unreachable ICMP mask reply ICMP router discovery Answers Explanation…

Continue ReadingWhat kind of ICMP message can be used by threat actors to perform network reconnaissance and scanning attacks?

Which network monitoring tool is in the category of network protocol analyzers?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which network monitoring tool is in the category of network protocol analyzers? SNMP SPAN Wireshark SIEM Answers Explanation & Hints: Wireshark is a network protocol analyzer used to capture network…

Continue ReadingWhich network monitoring tool is in the category of network protocol analyzers?

What are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.) SIEM Wireshark SNMP SPAN network tap Answers Explanation & Hints: A network…

Continue ReadingWhat are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)