Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is data encapsulation?

A.

Browsing history is erased automatically with every session.

B.

The protocol of the sending host adds additional data to the packet header.

C.

Data is encrypted backwards, which makes it unusable.

D.

Multiple hosts can be supported with only a few public IP addresses.

Refer to the exhibit. Which set of actions must an engineer perform to identify and fix this issue?

A.

Reinstall the IIS server to reset certificate details to default and try to connect to the server.

B.

Remove the intermediate certificates and install the CA root certificate on each server.

C.

Implement a different version of CA authority and install intermediate certificates.

D.

Add client authentication to the certificate template, reissue, and apply the certificate.

Which option describes indicators of attack?

A.

spam emails on an employee workstation

B.

virus detection by the AV software

C.

blocked phishing attempt on a company

D.

malware reinfection within a few minutes of removal

What is a difference between tampered and untampered disk images?

A.

Tampered images have the same stored and computed hash.

B.

Untampered images are deliberately altered to preserve as evidence.

C.

Tampered images are used as evidence.

D.

Untampered images are used for forensic investigations.

Refer to the exhibit.

Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.

What is an incident response plan?

A.

an organizational approach to events that could lead to asset loss or disruption of operations

B.

an organizational approach to security management to ensure a service lifecycle and continuous improvements

C.

an organizational approach to disaster recovery and timely restoration of operational services

D.

an organizational approach to system backup and data archiving aligned to regulations

Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?

A.

resource exhaustion

B.

tunneling

C.

traffic fragmentation

D.

timing attack

An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an externa USB device to bypass security restrictions and steal data. The engineer could not find an external USB device Which piece of information must an engineer use for attribution in an investigation?

A.

list of security restrictions and privileges boundaries bypassed

B.

external USB device

C.

receptionist and the actions performed

D.

stolen data and its criticality assessment

Which vulnerability type is used to read, write, or erase information from a database?

A.

cross-site scripting

B.

cross-site request forgery

C.

buffer overflow

D.

SQL injection

What is a difference between SOAR and SIEM?

A.

SOAR platforms are used for threat and vulnerability management, but SIEM applications are not

B.

SIEM applications are used for threat and vulnerability management, but SOAR platforms are not

C.

SOAR receives information from a single platform and delivers it to a SIEM

D.

SIEM receives information from a single platform and delivers it to a SOAR