Which two of the following statements are true about Windows virtual memory? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two of the following statements are true about Windows virtual memory? (Choose two.) Virtual memory combines the RAM memory with the hard disk space to compensate for lack of…

Continue ReadingWhich two of the following statements are true about Windows virtual memory? (Choose two.)

Microsoft has operating systems that are targeted for which two kinds of devices? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Microsoft has operating systems that are targeted for which two kinds of devices? (Choose two.) servers network routers network switches personal printers personal computers Explanation & Hint: Microsoft offers operating…

Continue ReadingMicrosoft has operating systems that are targeted for which two kinds of devices? (Choose two.)

Which Windows registry hive would be used to track the history of USB storage devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Windows registry hive would be used to track the history of USB storage devices? HKEY_LOCAL_MACHINE (HKLM) HKEY_CURRENT_USER (HKCU) HKEY_CLASSES_ROOT (HKCR) HKEY_CURRENT_CONFIG (HKCC) Explanation & Hint: To track the history…

Continue ReadingWhich Windows registry hive would be used to track the history of USB storage devices?

What can be used to make a malicious file to appear to have 0 byte size in the dir command output?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What can be used to make a malicious file to appear to have 0 byte size in the dir command output? using AES to encrypt the file using winzip to compress the…

Continue ReadingWhat can be used to make a malicious file to appear to have 0 byte size in the dir command output?

Why is malware that runs as a Windows service more difficult for the average end user to detect?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Why is malware that runs as a Windows service more difficult for the average end user to detect? because services run in the background and do not interact with the…

Continue ReadingWhy is malware that runs as a Windows service more difficult for the average end user to detect?

What is the correct path to access on the example.txt file using Windows file share where the servername is “rwc” and the sharename is “users”?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the correct path to access on the example.txt file using Windows file share where the servername is “rwc” and the sharename is “users”? \rwc\users\example.txt \\rwc\users\example.txt  \\rwc\users\\example.txt .rwc\users\example.txt ..rwc\users\example.txt…

Continue ReadingWhat is the correct path to access on the example.txt file using Windows file share where the servername is “rwc” and the sharename is “users”?

With Windows version 8 or higher, which utility can be used to display the users who are currently logged in to the system, and the resources that are consumed by the applications and processes that belong to each user?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

With Windows version 8 or higher, which utility can be used to display the users who are currently logged in to the system, and the resources that are consumed by…

Continue ReadingWith Windows version 8 or higher, which utility can be used to display the users who are currently logged in to the system, and the resources that are consumed by the applications and processes that belong to each user?

On an infected Windows host, what command can be used to verify if the host has an established HTTP connection to the command and control server?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

On an infected Windows host, what command can be used to verify if the host has an established HTTP connection to the command and control server? tracert netstat net packet-capture…

Continue ReadingOn an infected Windows host, what command can be used to verify if the host has an established HTTP connection to the command and control server?

Which of the following does an organization use to identify security gaps in the most complete manner?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which of the following does an organization use to identify security gaps in the most complete manner? incident response reporting SIEM logs showing illegal log-in attempts security audits IPS logs…

Continue ReadingWhich of the following does an organization use to identify security gaps in the most complete manner?

Which two statements are true about red teams and blue teams? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two statements are true about red teams and blue teams? (Choose two.) In addition to using penentration tests, a red team can use vulnerability tests to perform their work.…

Continue ReadingWhich two statements are true about red teams and blue teams? (Choose two.)

Carlos has many years of experience working in a CSIRT and currently works as a threat hunter. Of the following, what is his primary resource?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Carlos has many years of experience working in a CSIRT and currently works as a threat hunter. Of the following, what is his primary resource? threat intelligence log files from…

Continue ReadingCarlos has many years of experience working in a CSIRT and currently works as a threat hunter. Of the following, what is his primary resource?

Which two statements are true about primary and secondary teams? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two statements are true about primary and secondary teams? (Choose two.) Primary teams represent the cornerstone of the security teams. They are interdependent. Secondary teams are composed of primary…

Continue ReadingWhich two statements are true about primary and secondary teams? (Choose two.)

Sanija works in the forensics group of a CSIRT team. Which two of the following are primary outputs for which she is responsible? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Sanija works in the forensics group of a CSIRT team. Which two of the following are primary outputs for which she is responsible? (Choose two.) threat assessment report bit-by-bit copy…

Continue ReadingSanija works in the forensics group of a CSIRT team. Which two of the following are primary outputs for which she is responsible? (Choose two.)

Which statement best describes the differences between the blue team and red team roles and responsibilities?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which statement best describes the differences between the blue team and red team roles and responsibilities? The red team works in a reactionary manner to thwart attacks, the blue team…

Continue ReadingWhich statement best describes the differences between the blue team and red team roles and responsibilities?

Which two statements are true about penetration tests and vulnerability assessments? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two statements are true about penetration tests and vulnerability assessments? (Choose two.) A penetration test is an intrusive test that attempts to exploit vulnerabilities. A vulnerability assessment is a…

Continue ReadingWhich two statements are true about penetration tests and vulnerability assessments? (Choose two.)

What is the fundamental element of a corporation’s security posture, upon which other elements are based?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What is the fundamental element of a corporation’s security posture, upon which other elements are based? policies security device configurations (firewalls, others) incident response corporate planning Explanation & Hint: The…

Continue ReadingWhat is the fundamental element of a corporation’s security posture, upon which other elements are based?

Which assessment method will likely be the best fit for this organization?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

You work as a security specialist and are contracted by an organization to provide a security assessment. The organization’s corporate governance dictates that the assessment must be nonintrusive and must…

Continue ReadingWhich assessment method will likely be the best fit for this organization?