Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which Windows CLI tool can identify the command-line options being passed to a program at startup?

A.

netstat

B.

attrib

C.

WMIC

D.

Tasklist

Which could be described as a Threat Vector?

A.

A web server left6 unpatched and vulnerable to XSS

B.

A coding error allowing remote code execution

C.

A botnet that has infiltrated perimeter defenses

D.

A wireless network left open for anonymous use

What are Browser Helper Objects (BHO)s used for?

A.

To provide multi-factor authentication support for Firefox

B.

To provide a more feature-rich interface for Internet Explorer

C.

To allow Internet Explorer to process multi-part URLs

D.

To allow Firefox to process JavaScript in a sandbox

To detect worms and viruses buried deep within a network packet payload, Gigabytes worth of traffic content entering and exiting a network must be checked with which of the following technologies?

A.

Proxy matching

B.

Signature matching

C.

Packet matching

D.

Irregular expression matching

E.

Object matching

An internal host at IP address 10.10.50.100 is suspected to be communicating with a command and control whenever a user launches browser window. What features and settings of Wireshark should be used to isolate and analyze this network traffic?

A.

Filter traffic using ip.src = = 10.10.50.100 and tcp.srcport = = 80, and use Expert Info

B.

Filter traffic using ip.src = = 10.10.50.100 and tcp.dstport = = 53, and use Expert Info

C.

Filter traffic using ip.src = = 10.10.50.100 and tcp.dstport = = 80, and use Follow TCP stream

D.

Filter traffic using ip.src = = 10.10.50.100, and use Follow TCP stream

When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?

A.

Signature-based

B.

Anomaly-based

C.

Statistical

D.

Monitored

The creation of a filesystem timeline is associated with which objective?

A.

Forensic analysis

B.

First response

C.

Access control

D.

Incident eradication

Monitoring the transmission of data across the network using a man-in-the-middle attack presents a threat against which type of data?

A.

At-rest

B.

In-transit

C.

Public

D.

Encrypted

Which of the following attacks would use “..” notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?

A.

URL directory

B.

HTTP header attack

C.

SQL injection

D.

IDS evasion

E.

Cross site scripting

What would be the output of the following Google search?

filetype:doc inurl:ws_ftp

A.

Websites running ws_ftp that allow anonymous logins

B.

Documents available on the ws_ftp.com domain

C.

Websites hosting the ws_ftp installation program

D.

Documents found on sites with ws_ftp in the web address