Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit.

What is occurring?

A.

ARP flood

B.

DNS amplification

C.

ARP poisoning

D.

DNS tunneling

Refer to the exhibit.

A company employee is connecting to mail google.com from an endpoint device. The website is loaded but with an error. What is occurring?

A.

DNS hijacking attack

B.

Endpoint local time is invalid.

C.

Certificate is not in trusted roots.

D.

man-m-the-middle attack

Drag and drop the technology on the left onto the data type the technology provides on the right.

A vulnerability analyst is performing the monthly scan data review Output data is very big and getting bigger each month The analyst decides to create a more efficient process to complete the task on time All false positives and true positives are excluded from the results The remaining findings will be assigned to a technical team for further remediation What is the result of such activity?

A.

False negatives must also be excluded from the data

B.

Data is filtered property and contains only valid results

C.

Exclusion is not needed and all data must be remediated

D.

Analysis is not performed correctly, and it is missing correct data

What is a difference between inline traffic interrogation and traffic mirroring?

A.

Inline inspection acts on the original traffic data flow

B.

Traffic mirroring passes live traffic to a tool for blocking

C.

Traffic mirroring inspects live traffic for analysis and mitigation

D.

Inline traffic copies packets for analysis and security

Refer to the exhibit.

Which type of log is displayed?

A.

proxy

B.

NetFlow

C.

IDS

D.

sys

What are indicators of attack?

A.

large numbers of requests for the same file

B.

multiple tog ins from different regions

C.

swells in database read volume

D.

suspicious registry or system file changes

What is the purpose of a ransomware attack?

A.

to make files inaccessible by encrypting the data

B.

to decrypt encrypted data and disks

C.

to send keystrokes to a threat actor

D.

to escalate privileges

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

A.

input validation

B.

hash collision

C.

integer overflow

D.

command injection

Which security technology allows only a set of pre-approved applications to run on a system?

A.

application-level blacklisting

B.

host-based IPS

C.

application-level whitelisting

D.

antivirus