An online e-commerce shopping site collects sales data to help improve their operation and profits. Which data type would be used to record the number of products purchased by a customer?

An online e-commerce shopping site collects sales data to help improve their operation and profits. Which data type would be used to record the number of products purchased by a…

Comments Off on An online e-commerce shopping site collects sales data to help improve their operation and profits. Which data type would be used to record the number of products purchased by a customer?

A sales department is analyzing the sales trend for one of their best products. They collected quarterly sales number over the past five years and want to plot the data in a graphical format for quick analysis and interpretation. Which one is NOT a good way to visualize?

A sales department is analyzing the sales trend for one of their best products. They collected quarterly sales number over the past five years and want to plot the data…

Comments Off on A sales department is analyzing the sales trend for one of their best products. They collected quarterly sales number over the past five years and want to plot the data in a graphical format for quick analysis and interpretation. Which one is NOT a good way to visualize?

What is an example of structured data?

What is an example of structured data? Data entered into spreadsheets Digital photos Content found on web pages Electronic journals Answers Explanation & Hints: An example of structured data would…

Comments Off on What is an example of structured data?

‘Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false?

'Securing physical access to target equipment is an organization’s best defense against a cyber attack.' Is this true or false? True False Answers Explanation & Hints: Securing physical access to…

Comments Off on ‘Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false?

Which living-off-the-land post-exploitation technique can get directory listings, copy and move files, get a list of running processes, and perform administrative tasks?

Which living-off-the-land post-exploitation technique can get directory listings, copy and move files, get a list of running processes, and perform administrative tasks? PowerShell Sysinternals WMI BloodHound Explanation & Hint: PowerShell…

Comments Off on Which living-off-the-land post-exploitation technique can get directory listings, copy and move files, get a list of running processes, and perform administrative tasks?

Which tool can be used to perform a Disassociation attack?

Which tool can be used to perform a Disassociation attack? Airmon-ng nmap POODLE EMPIRE Explanation & Hint: Airmon-ng (part of the Aircrack-ng suite) can perform wireless reconnaissance and disassociation attacks.…

Comments Off on Which tool can be used to perform a Disassociation attack?

Match the attack type with the respective description.

Match the attack type with the respective description. Reflected DOS ==> This attack uses spoofed packets that appear to be from the victim. Then the sources become unwitting participants in…

Comments Off on Match the attack type with the respective description.

Which is a characteristic of the pass-the-hash attack?

Which is a characteristic of the pass-the-hash attack? capture of a password hash (as opposed to the password characters) and using the same hashed value for authentication and lateral access…

Comments Off on Which is a characteristic of the pass-the-hash attack?