missed final practice
What three services are offered by FireEye? (Choose three.)
blocks attacks across the web identifies and stops latent malware on files identifies and stops email threat vectors
What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)
certificate authority digital certificates
What are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.)
confidentiality availability integrity
Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?
identification and authentication policy
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
network layer
Which two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.)
routing updates traffic STP traffic
A network administrator is configuring an AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.) CorrectResponse YourResponse
separate processes for authentication and authorization encryption for all communication
Which three pieces of information are found in session data? (Choose three.)
source and destination port numbers source and destination MAC addresses source and destination IP addresses
What is a purpose of entering the nslookup cisco.com command on a Windows PC?
to check if the DNS service is running
What are two shared characteristics of the IDS and the IPS? (Choose two.)
Both are deployed as sensors Both use signatures to detect malicious traffic.
Which two statements describe access attacks? (Choose two.)
Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execute malicious code. password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers.
An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?
DHCP spoofing
Which three algorithms are designed to generate and verify digital signatures? (Choose three.)
DSA RSA ECDSA
In an attempt to prevent network attacks, cyber analysts share unique identifiable attributes of known attacks with colleagues. What three types of attributes or indicators of compromise are helpful to share? (Choose three
IP addresses of attack servers changes made to end system software features of malware files
Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?
Install a web shell on the target web server for persistent access.
How might corporate IT professionals deal with DNS-based cyber threats?
Monitor DNS proxy server logs and look for unusual DNS queries
What are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)
SPAN network tap
When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?
Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.
Which network monitoring tool is in the category of network protocol analyzers?
Wireshark
