Which one of the following commands is required on an interface in order to apply an ACL as a packet filter?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which one of the following commands is required on an interface in order to apply an ACL as a packet filter? access-class ip access-group ip access-list <SGA group id> Explanation &…

Continue ReadingWhich one of the following commands is required on an interface in order to apply an ACL as a packet filter?

Which access control model originates from the military and uses security labels?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which access control model originates from the military and uses security labels? access control list discretionary access control mandatory access control role-based access control Explanation & Hint: The access control…

Continue ReadingWhich access control model originates from the military and uses security labels?

Which statement best describes how a network-based malware protection feature detects a possible event?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which statement best describes how a network-based malware protection feature detects a possible event? Using virus signature files locally on the firewall, it will detect incorrect MD5 file hashes. The…

Continue ReadingWhich statement best describes how a network-based malware protection feature detects a possible event?

Which two of the following protocols are most commonly found in AAA? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two of the following protocols are most commonly found in AAA? (Choose two.) TCP/IP TACACS+ OSPF MD5 RADIUS IPSEC Explanation & Hint: In the context of AAA, which stands…

Continue ReadingWhich two of the following protocols are most commonly found in AAA? (Choose two.)

Which two statements are true regarding commercial and Open Source SOC tools? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two statements are true regarding commercial and Open Source SOC tools? (Choose two.) Commercial tools tend to be polished and full-featured and come with vendor support, but they also…

Continue ReadingWhich two statements are true regarding commercial and Open Source SOC tools? (Choose two.)

Which security device is best for defending Web Servers against the OWASP Top 10 web application security risks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which security device is best for defending Web Servers against the OWASP Top 10 web application security risks? load balancer intrusion prevention system web security appliance stateful firewall web application…

Continue ReadingWhich security device is best for defending Web Servers against the OWASP Top 10 web application security risks?

Which endpoint security technology should be used to prevent any incoming connections to the host?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which endpoint security technology should be used to prevent any incoming connections to the host? host-based personal firewall host-based antivirus host-based IDS host-based malware protection Explanation & Hint: To prevent…

Continue ReadingWhich endpoint security technology should be used to prevent any incoming connections to the host?

An end user’s host becomes infected with a virus because the end user browsed to a malicious website. Which endpoint security technology can be used to best prevent such an incident?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

An end user’s host becomes infected with a virus because the end user browsed to a malicious website. Which endpoint security technology can be used to best prevent such an…

Continue ReadingAn end user’s host becomes infected with a virus because the end user browsed to a malicious website. Which endpoint security technology can be used to best prevent such an incident?

What is the primary difference between a host-based firewall and a traditional firewall?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What is the primary difference between a host-based firewall and a traditional firewall? The host-based firewall can block traffic based on application or file type. The traditional firewall can identify…

Continue ReadingWhat is the primary difference between a host-based firewall and a traditional firewall?

File integrity checking tools work by calculating hash values of important files, storing the hash values, and periodically comparing those hash values to hash values that it calculates later. If a file hash value comparison results in a mismatch, what does that indicate?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

File integrity checking tools work by calculating hash values of important files, storing the hash values, and periodically comparing those hash values to hash values that it calculates later. If…

Continue ReadingFile integrity checking tools work by calculating hash values of important files, storing the hash values, and periodically comparing those hash values to hash values that it calculates later. If a file hash value comparison results in a mismatch, what does that indicate?

After a file disposition changes from unknown to malicious, what is the next step that should be taken?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

After a file disposition changes from unknown to malicious, what is the next step that should be taken? Run the file in a sandbox to verify if it is malicious…

Continue ReadingAfter a file disposition changes from unknown to malicious, what is the next step that should be taken?

When Cisco AMP for Endpoints detects that an unknown file has been received on an endpoint, what does it do with the file?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

When Cisco AMP for Endpoints detects that an unknown file has been received on an endpoint, what does it do with the file? submits the file to the cloud for…

Continue ReadingWhen Cisco AMP for Endpoints detects that an unknown file has been received on an endpoint, what does it do with the file?

During incident investigations, what does the AMP for endpoints device trajectory feature show?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

During incident investigations, what does the AMP for endpoints device trajectory feature show? hosts that have seen the malicious file the signature that triggered the malicious file alert actions that…

Continue ReadingDuring incident investigations, what does the AMP for endpoints device trajectory feature show?

Which method is a permissive security control in which only specified applications can run on an end host, while all other applications are prevented?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which method is a permissive security control in which only specified applications can run on an end host, while all other applications are prevented? application blocked lists application allowed lists…

Continue ReadingWhich method is a permissive security control in which only specified applications can run on an end host, while all other applications are prevented?

If the parent process is terminated before its children, what will the PPID column show in the ps command?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

If the parent process is terminated before its children, what will the PPID column show in the ps command? N/A - 0 1 Explanation & Hint: If the parent process is terminated…

Continue ReadingIf the parent process is terminated before its children, what will the PPID column show in the ps command?

When a host name is being translated to an IP address, where will the operating system look first?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

When a host name is being translated to an IP address, where will the operating system look first? /etc/hosts /etc/hostname /etc/resolv.conf It depends on the configuration of /etc/nsswitch.conf. Explanation & Hint:…

Continue ReadingWhen a host name is being translated to an IP address, where will the operating system look first?

A junior analyst is trying to use the tcpdump –i eth1 command on an Ubuntu system, but it is not working. What could be the problem?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

A junior analyst is trying to use the tcpdump –i eth1 command on an Ubuntu system, but it is not working. What could be the problem? The tcpdump command requires root level privilege. The tcpdump command…

Continue ReadingA junior analyst is trying to use the tcpdump –i eth1 command on an Ubuntu system, but it is not working. What could be the problem?