Which option is true when using the traffic mirror feature in a switch?
A. Packets are automatically decrypted.
B. Ethernet headers are modified before capture.
C. Packet payloads are lost.
D. Full packet captures are possible.
What does Common Vulnerabilities and Exposures represent?
A. vulnerability exposure index
B. vulnerability identifier
C. common vulnerability scanning system
D. vulnerability scoring system
What is a byproduct when defense-in-depth strategies are not applied to network architecture design?
A. An attacker will have a single point of entry into a system.
B. Weaknesses in the security posture, such as weak passwords or unpatched software, provide multiple avenues to attack the network.
C. Weak firewall rule-sets make it easier for attackers to compromise the network.
D. There is no byproduct of weak defense-in-depth strategies.
What is required for a Windows user to perform a task with administrator-level access?
A. use the "Run as Administrator" option
B. enter the kernel mode
C. boot the system into the safe mode
D. log in as a domain user then switch to the "Admin" group
What does the chmod 766 command do to a file?
A. changes the file's read/write/execute permissions to a desired configuration B. changes the filename from 766 to whatever value is set in the section
C. It does nothing; it is an illegal command.
D. deletes the file that is identified in the description
What is the main purpose of an exploit kit for malicious actors?
A. continuously changing the IP addresses for the command and control infrastructure
B. sending updates and new commands to all the endpoint bots in a DDoS botnet
C. scanning potential victim computer for vulnerable applications so that malware can be delivered
D. encrypting malware to hinder the reverse engineering efforts of incident response teams
Which two languages are commonly used in client scripting? (Choose two.)
A. JavaScript
B. VBScript
C. Perl
D. PHP
E. Python
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?
A. exploit kit
B. root kit
C. vulnerability kit
D. script kiddie kit
When data is sent from one host to another host, the sending host must package up the data. What is this packaging-up process called?
A. packaging
B. encapsulation
C. containerization
D. encoding
Which one of the following protocols is used to automatically assign IP addresses and set TCP/IP stack configuration parameters?
A. DNS
B. TFTP
C. DHCP
D. RARP