Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which security principle requires more than one person is required to perform a critical task?

A.

least privilege

B.

need to know

C.

separation of duties

D.

due diligence

What is the name of the technology that searches for and reports on known weaknesses and flaws present in an organization’s IT infrastructure?

A.

vulnerability scanner

B.

identity and access management

C.

configuration management

D.

mobile device management

Refer to the exhibit. An employee received an email from an unknown sender with an attachment and reported it as a phishing attempt. An engineer uploaded the file to Cuckoo for further analysis. What should an engineer interpret from the provided Cuckoo report?

A.

Win32.polip.a.exe is an executable file and should be flagged as malicious.

B.

The file is clean and does not represent a risk.

C.

Cuckoo cleaned the malicious file and prepared it for usage.

D.

MD5 of the file was not identified as malicious.

An engineer must compare NIST vs ISO frameworks The engineer deeded to compare as readable documentation and also to watch a comparison video review. Using Windows 10 OS. the engineer started a browser and searched for a NIST document and then opened a new tab in the same browser and searched for an ISO document for comparison

The engineer tried to watch the video, but there 'was an audio problem with OS so the engineer had to troubleshoot it At first the engineer started CMD and looked fee a driver path then locked for a corresponding registry in the registry editor The engineer enabled "Audiosrv" in task manager and put it on auto start and the problem was solved Which two components of the OS did the engineer touch? (Choose two)

A.

permissions

B.

PowerShell logs

C.

service

D.

MBR

E.

process and thread

Which risk approach eliminates activities posing a risk exposure?

A.

risk acknowledgment

B.

risk avoidance

C.

risk reduction

D.

risk retention

What is the difference between the ACK flag and the RST flag?

A.

The RST flag approves the connection, and the ACK flag terminates spontaneous connections.

B.

The ACK flag confirms the received segment, and the RST flag terminates the connection.

C.

The RST flag approves the connection, and the ACK flag indicates that a packet needs to be resent

D.

The ACK flag marks the connection as reliable, and the RST flag indicates the failure within TCP Handshake

Refer to the exhibit.

Which component is identifiable in this exhibit?

A.

Trusted Root Certificate store on the local machine

B.

Windows PowerShell verb

C.

Windows Registry hive

D.

local service in the Windows Services Manager

What are two differences of deep packet inspection compared to stateful firewall inspection? (Choose two.)

A.

static lists for maintaining a strict access control level

B.

offers application-level monitoring

C.

inspection of only the first packet during a connection attempt

D.

different rule configurations based on payload pattern

E.

quality of service capabilities based on list definitions

Which data capture includes payload and header information?

A.

frame check sequence

B.

full packet

C.

alert data

D.

session logs

Refer to the exhibit.

Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.