Reference no: EM133309621
1. The identification of malware happens by using an IP Address and Domain Name System (DNS) Analysis by correlating a packet trace destination address information with the threat intelligence feed of known-bad IP addresses and domains. It will often avoid using hard-coded IP ranges. What is the exploitation strategy the malware is using to accomplish this?
A. Domain Generated Algorithm (DGA)
B. Data exfiltration
C. Fire wire algorithm
D. Zero day exploitation
2. There are many sources of best practices for secure coding. Which of the given choices is based on community effort?
A. SPSS
B. MOU
C. NVD
D. OWASP
3. A vendor is supporting a military agency to resolve issues with their network intrusion detection system and provide a better solution. The salesperson is requesting information about the network to provide good feedback. Which types of documentation is the military point of contact (POC) allowed to provide to the vendor with a signed non-disclosure agreement (NDA)?
A. Private
B. Unclassified
C. Secret
D. Internal use only
4. Determine which authentication method allows a user to access multiple systems using their initial authentication.
A. Single Sign-on
B. Password and UID
C. Multi-factor authentication
D. Two factor authentication
5. An attacker manipulates query code that results in the deletion of numerous database records. Considering the attack types, which does the attacker deploy?
A. CSRF
B. Credential Stuffing
C. XML
D. SQL injection
6. A network engineer utilizes a Linux workstation to discover open ports on a company workstation. Which tool does the engineer use?
A. Hping
B. Nmap
C. Metasploit
D. Burpsuite
7. Which option utilizes a brute force approach?
A. Password spraying
B. Privilege escalation
C. Impersonation
D. Remote code execution
8. A sophisticated, long-term and multi-staged attack, usually orchestrated by nation-state groups, or well-organized criminal enterprises.
A. APT
B. DDoS
C. Solarwinds
D. MiTM
9. Malware that is widely available either for purchase or by free download. It is not customized or tailored to a specific attack. It does not require complete understanding of its processes and is used by a wide range of threat actors with a range of skill levels
True OR False
10. Is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination
A. Honeynet
B. Steganalysis
C. Reconnaissance
D. Steganography
What is your advice to your client has come to your office
: Your client has come to your office for advice after receiving notice from their lender that they are initiating foreclosure on their primary residence.
|
Identify the software development life cycle
: Identify the Software Development Life Cycle (SDLC) step where developers perform "black box" or "grey box" analysis to test for vulnerabilities
|
Examine the different strategies countries around the world
: Examine the different strategies countries around the world have adopted to meet the costs of medical care in comparison with the United States
|
Create a clear thesis statement and craft your essay
: Create a clear thesis statement and craft your essay around supporting and explaining this thesis. The thesis should relate to the topic (environmental impact)
|
Correlating packet trace destination
: The identification of malware happens by using an IP Address and Domain Name System (DNS) Analysis by correlating a packet trace destination
|
Why gender dynamics represent distinctive of urban legends
: Explore how genders in urban legends emphasize major arguments about identity, difference, and conflict across boundaries of sexuality.
|
Identify the worldview eurocentric, indigenous and eastern
: Identify the worldview (e.g., Eurocentric, Indigenous, Eastern), political ideologies (e.g., capitalism, neoliberalism, socialism, communism, individualism
|
How would you explain the pathophysiology processes involved
: Describe how you would respond to the following scenarios. How would you explain the pathophysiology processes involved and impact on their system
|
How or why it does not contribute to social justice
: Does the Mckinney-Vento Act contribute to social justice? How? If not, explain how or why it does not contribute to social justice
|