Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which method is used by some malware to transfer files from infected hosts to a threat actor host? HTTPS traffic encryption ICMP tunneling iFrame injection UDP infiltration Answers Explanation &…

Continue ReadingWhich method is used by some malware to transfer files from infected hosts to a threat actor host?

Which protocol is a name resolution protocol often used by malware to communicate with command-and-control (CnC) servers?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which protocol is a name resolution protocol often used by malware to communicate with command-and-control (CnC) servers? DNS HTTPS ICMP IMAP Answers Explanation & Hints: Domain Name Service (DNS) is…

Continue ReadingWhich protocol is a name resolution protocol often used by malware to communicate with command-and-control (CnC) servers?

Which technique would a threat actor use to disguise traces of an ongoing exploit?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which technique would a threat actor use to disguise traces of an ongoing exploit? Use SSL to encapsulate malware. Create an invisible iFrame on a web page. Corrupt time information…

Continue ReadingWhich technique would a threat actor use to disguise traces of an ongoing exploit?

Match the NIST Cybersecurity Framework core function with the description. (Not all options are used.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Match the NIST Cybersecurity Framework core function with the description. (Not all options are used.) Explanation & Hint: The Framework consists of standards, guidelines, and practices to promote the protection…

Continue ReadingMatch the NIST Cybersecurity Framework core function with the description. (Not all options are used.)

What are the three outcomes of the NIST Cybersecurity Framework identify core function? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are the three outcomes of the NIST Cybersecurity Framework identify core function? (Choose three.) asset management risk assessment governance mitigation recovery planning information protection process and procedures Answers Explanation…

Continue ReadingWhat are the three outcomes of the NIST Cybersecurity Framework identify core function? (Choose three.)

In what order are the steps in the vulnerability management life cycle conducted?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In what order are the steps in the vulnerability management life cycle conducted? discover, prioritize assets, assess, report, remediate, verify discover, assess, prioritize assets, report, remediate, verify discover, prioritize assets,…

Continue ReadingIn what order are the steps in the vulnerability management life cycle conducted?

Which security management plan specifies a component that involves tracking the location and configuration of networked devices and software across an enterprise?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which security management plan specifies a component that involves tracking the location and configuration of networked devices and software across an enterprise? asset management risk management vulnerability management patch management…

Continue ReadingWhich security management plan specifies a component that involves tracking the location and configuration of networked devices and software across an enterprise?

What is an action that should be taken in the discovery step of the vulnerability management life cycle?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is an action that should be taken in the discovery step of the vulnerability management life cycle? assigning business value to assets determining a risk profile developing a network…

Continue ReadingWhat is an action that should be taken in the discovery step of the vulnerability management life cycle?

In addressing a risk that has low potential impact and relatively high cost of mitigation or reduction, which strategy will accept the risk and its consequences?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In addressing a risk that has low potential impact and relatively high cost of mitigation or reduction, which strategy will accept the risk and its consequences? risk sharing risk retention…

Continue ReadingIn addressing a risk that has low potential impact and relatively high cost of mitigation or reduction, which strategy will accept the risk and its consequences?

In addressing an identified risk, which strategy aims to stop performing the activities that create risk?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In addressing an identified risk, which strategy aims to stop performing the activities that create risk? risk sharing risk retention risk reduction risk avoidance Answers Explanation & Hints: There are…

Continue ReadingIn addressing an identified risk, which strategy aims to stop performing the activities that create risk?

Which two classes of metrics are included in the CVSS Base Metric Group? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two classes of metrics are included in the CVSS Base Metric Group? (Choose two.) Impact metrics Exploitability Modified Base Exploit Code Maturity Confidentiality Requirement Answers Explanation & Hints: The…

Continue ReadingWhich two classes of metrics are included in the CVSS Base Metric Group? (Choose two.)

A cybersecurity analyst is performing a CVSS assessment on an attack where a web link was sent to several employees. Once clicked, an internal attack was launched. Which CVSS Base Metric Group Exploitability metric is used to document that the user had to click on the link in order for the attack to occur?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A cybersecurity analyst is performing a CVSS assessment on an attack where a web link was sent to several employees. Once clicked, an internal attack was launched. Which CVSS Base…

Continue ReadingA cybersecurity analyst is performing a CVSS assessment on an attack where a web link was sent to several employees. Once clicked, an internal attack was launched. Which CVSS Base Metric Group Exploitability metric is used to document that the user had to click on the link in order for the attack to occur?

When a server profile for an organization is being established, which element describes the TCP and UDP daemons and ports that are allowed to be open on the server?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

When a server profile for an organization is being established, which element describes the TCP and UDP daemons and ports that are allowed to be open on the server? listening…

Continue ReadingWhen a server profile for an organization is being established, which element describes the TCP and UDP daemons and ports that are allowed to be open on the server?

Match the network profile element to the description. (Not all options are used.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Match the network profile element to the description. (Not all options are used.) Answers Explanation & Hints: Important elements of a network profile include: Total throughput - the amount of…

Continue ReadingMatch the network profile element to the description. (Not all options are used.)

In network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities? risk analysis penetration testing vulnerability assessment strength…

Continue ReadingIn network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?

Which two statements correctly describe certificate classes used in the PKI? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two statements correctly describe certificate classes used in the PKI? (Choose two.) A class 0 certificate is for testing purposes. A class 0 certificate is more trusted than a…

Continue ReadingWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity? PKI certificates symmetric keys hashing algorithms digital signatures Answers Explanation…

Continue ReadingWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?

In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself? from the root CA only from the root CA or from self-generation from the root…

Continue ReadingIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?