exam op

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In which situation is an asymmetric key algorithm used?

A network administrator connects to a Cisco router with SSH.

What is the responsibility of the human resources department when handling a security incident?

Apply disciplinary measures if an incident is caused by an employee

0. What are two advantages of the NTFS file system compared with FAT32

NTFS provides more security features. NTFS supports larger partitions.

What is a difference between symmetric and asymmetric encryption algorithms?

Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application? Event

Task Manager

In a networking class, the instructor tells the students to ping the other computers in the classroom from the command prompt. Why do all pings in the class fail

The Windows firewall is blocking the ping.

What two assurances does digital signing provide about code that is downloaded from the Internet

The code is authentic and is actually sourced by the publisher The code has not been modified since it left the software publisher

. How do cybercriminals make use of a malicious iFrame?

The iFrame allows the browser to load a web page from another source.l

Which scenario is probably the result of activities by a group of hacktivists?

The internal emails related to the handling of an environmental disaster by a petroleum company appear on multiple websites.

Refer to the exhibit. A network administrator is viewing some output on the Netflow collector. What can be determined from the output of the traffic flow shown?

This is a UDP DNS response to a client machine.

What is a network tap

a passive device that forwards all traffic and physical layer errors to an analysis device

Which technique is necessary to ensure a private transfer of data using a VPN?

encryption

What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?

financial gain

. A network security professional has applied for a Tier 2 position in a SOC. What is a typical job function that would be assigned to a new employee?

further investigating security incidents

As described by the SANS Institute, which attack surface includes the use of social engineering?

human attack surface

What are three responsibilities of the transport layer

meeting the reliability requirements of applications, if any identifying the applications and services on the client and server that should handle transmitted data multiplexing multiple communication streams from many users or applications on the same network

Which two net commands are associated with network resource sharing

net use net share

What is a function of SNMP?

provides a message format for communication between network device managers and agents

. According to NIST, which step in the digital forensics process involves preparing and presenting information that resulted from scrutinizing data? examination

reporting

Which Windows Event Viewer log includes events regarding the operation of drivers, processes, and hardware?

system logs

Refer to the exhibit. A network security specialist issues the command tcpdump to capture events. What does the number 6337 indicate?

the process id of the tcpdump command

Which three technologies should be included in a security information and event management system in a SOC

threat intelligence security monitoring vulnerability tracking

Which two statements are characteristics of a virus

A virus typically requires end-user activation A virus can be dormant and then activate at a specific time or date

Refer to the exhibit. A network administrator is showing a junior network engineer some output on the server. Which service would have to be enabled on the server to receive such output?

SNMP

Which statement identifies an important difference between the TACACS+ and RADIUS protocols?

The TACACS+ protocol allows for separation of authentication from authorization


संबंधित स्टडी सेट्स

COM 505 - Exam 2 (Defamation, Libel & Privacy)

View Set

Health Issues: Chapter 3 - Managing Stress

View Set

Chapter 2 - Real estate interest and ownership

View Set

Missouri Compromise to the impact of the Kansas/Nebraska Act

View Set

Quantitative Reasoning Basic Knowledge

View Set

Marvel Cinematic Universe Trivia

View Set

Texas Promulgated Contract Forms - Chapter 5

View Set