Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which type of data must an engineer capture to analyze payload and header information?

A.

frame check sequence

B.

alert data

C.

full packet

D.

session logs

What describes the public key infrastructure (PKI)?

A.

PKI verifies the identity of the user and sender and creates secure communication channels using asymmetric encryption.

B.

PKI ensures packet loss prevention and creates secure communication channels using symmetric encryption.

C.

PKI verifies the identity of the user and sender and creates secure communication channels using symmetric encryption.

D.

PKI ensures packet loss prevention and creates secure communication channels using asymmetric encryption.

Refer to exhibit.

An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?

A.

data encapsulation

B.

IP fragmentation

C.

code obfuscation

D.

data encryption

Drag and drop the data source from the left onto the data type on the right.

Drag and drop the access control models from the left onto the correct descriptions on the right.

Which information must an organization use to understand the threats currently targeting the organization?

A.

threat intelligence

B.

risk scores

C.

vendor suggestions

D.

vulnerability exposure

An analyst performs traffic analysis to detect data exfiltration and identifies a high frequency of DNS requests in a small period of time Which technology makes this behavior feasible?

A.

access control list

B.

NAT

C.

tunneling

D.

encryption

An analyst is exploring the functionality of different operating systems.

What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

A.

queries Linux devices that have Microsoft Services for Linux installed

B.

deploys Windows Operating Systems in an automated fashion

C.

is an efficient tool for working with Active Directory

D.

has a Common Information Model, which describes installed hardware and software

Drag and drop the data sources from the left onto the corresponding data types on the right.

Drag and drop the uses on the left onto the type of security system on the right.