missed final practice

¡Supera tus tareas y exámenes ahora con Quizwiz!

What three services are offered by FireEye? (Choose three.)

blocks attacks across the web identifies and stops latent malware on files identifies and stops email threat vectors

What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)

certificate authority digital certificates

What are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.)

confidentiality availability integrity

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

identification and authentication policy

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

network layer

Which two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.)

routing updates traffic STP traffic

A network administrator is configuring an AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.) CorrectResponse YourResponse

separate processes for authentication and authorization encryption for all communication

Which three pieces of information are found in session data? (Choose three.)

source and destination port numbers source and destination MAC addresses source and destination IP addresses

What is a purpose of entering the nslookup cisco.com command on a Windows PC?

to check if the DNS service is running

What are two shared characteristics of the IDS and the IPS? (Choose two.)

Both are deployed as sensors Both use signatures to detect malicious traffic.

Which two statements describe access attacks? (Choose two.)

Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execute malicious code. password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers.

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

DHCP spoofing

Which three algorithms are designed to generate and verify digital signatures? (Choose three.)

DSA RSA ECDSA

In an attempt to prevent network attacks, cyber analysts share unique identifiable attributes of known attacks with colleagues. What three types of attributes or indicators of compromise are helpful to share? (Choose three

IP addresses of attack servers changes made to end system software features of malware files

Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?

Install a web shell on the target web server for persistent access.

How might corporate IT professionals deal with DNS-based cyber threats?

Monitor DNS proxy server logs and look for unusual DNS queries

What are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)

SPAN network tap

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

Which network monitoring tool is in the category of network protocol analyzers?

Wireshark


Conjuntos de estudio relacionados

Carbohydrates-monosaccharides, Disaccharides, & Polysaccharides

View Set

Salesforce Design Strategy - Tools and Artifacts

View Set