Consider the following image of a packet capture:
This packet capture has recorded two types of attacks. Which choice lists both attack types?
Answer : B
Which of the following is a primary auditing activity?
Answer : C
You have determined that an attack is currently underway on your database server. An attacker is currently logged in, modifying data. You want to preserve logs, caching and other data on this affected server. Which of the following actions will best allow you to stop the attack and still preserve data?
Answer : A
Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?
Answer : A
You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet.
Which of the following is a primary concern for this solution?
Answer : D
Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company's physical and logical resources at risk?
Answer : B
Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?
Answer : A
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?
Answer : A
Consider the following diagram:
Which type of attack is occurring?
Answer : C
Which of the following is a primary weakness of asymmetric-key encryption?
Answer : A
Consider the following diagram involving two firewall-protected networks:
Which of the following is necessary for each of the firewalls to allow private IP addresses to be passed on to the Internet?
Answer : C
What is the primary strength of symmetric-key encryption?
Answer : C
You have been assigned to provide security measures for your office's reception area.
Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?
Answer : C
Consider the following image of a packet capture:
Which of the following best describes the protocol used, along with its primary benefit?
Answer : A