A) ./
B) ../
C) ..\
D) .\
Correct Answer
verified
Multiple Choice
A) -O
B) -o
C) -p
D) -r
Correct Answer
verified
Multiple Choice
A) customers who need sensitive data to remain onsite
B) customers whose expectations are set
C) customers who do not need cloud services
D) customers who want to move services to the cloud
Correct Answer
verified
Multiple Choice
A) unified2
B) database
C) binary (tcpdump)
D) CSV
Correct Answer
verified
Multiple Choice
A) Static NAT supports only TCP traffic.
B) Static NAT is normally deployed for outbound traffic only.
C) Static NAT provides a one-to-one mapping between IP addresses.
D) Static NAT provides a many-to-one mapping between IP addresses.
Correct Answer
verified
Multiple Choice
A) compares evaluated packets to normal, daily network-traffic patterns
B) removes any protocol-induced or protocol-allowable ambiguities
C) compares a packet to related traffic from the same session, to determine whether the packet is out of sequence
D) removes application layer data, whether or not it carries protocol-induced anomalies, so that packet headers can be inspected more accurately for signs of abuse
Correct Answer
verified
Multiple Choice
A) It is the ability to use two separate passwords.
B) It is the ability to enable biometric authentication.
C) It is the ability to have a passphrase sent to a mobile device.
D) It is the ability to use a verification code in conjunction with the correct username and password.
Correct Answer
verified
Multiple Choice
A) 60 minutes
B) 120 minutes
C) 1024 minutes
D) 1440 minutes
Correct Answer
verified
Multiple Choice
A) opadmin.<your domain>.com
B) console.<your domain>.com
C) cloud.<your domain>.com
D) aws.<your domain>.com
Correct Answer
verified
Multiple Choice
A) It searches for potential threats based on identified activities.
B) It tracks file behavior across the network to see which devices it enters and exits.
C) It analyzes the data from file and process retrospection to provide a new level of threat intelligence.
D) It isolates suspicious files and runs tests to determine their authenticity.
E) It tracks file behavior on a device to pinpoint the root cause of a compromise.
Correct Answer
verified
Multiple Choice
A) Do nothing because Snort produces ASCII output by default.
B) Use the -K ascii switch when you start Snort from the command line.
C) Compile Snort with the -K ascii flag in the configure command.
D) Use a third-party application to convert native Snort output to ASCII.
Correct Answer
verified
Multiple Choice
A) Fifty-six percent of employees who leave a company take private information with them.
B) Competitors are gaining a 33 percent market share.
C) Administrators are allowing a growing number of BYOD devices.
D) Staff is unable to keep up with newer data center technology.
E) Provisioning time for data centers has decreased from eight weeks to 15 minutes.
F) Management is expected to decrease IT budgets by 25 percent.
Correct Answer
verified
Multiple Choice
A) It is a shell script that works on any Linux platform.
B) It must be compiled separately.
C) You must obtain it from Sourceforge.
D) It is not open source.
Correct Answer
verified
Multiple Choice
A) UDP
B) ICMP
C) ARP
D) DNS
Correct Answer
verified
Multiple Choice
A) Administrator
B) Intrusion Administrator
C) Security Analyst
D) Security Analyst (Read-Only)
Correct Answer
verified
Multiple Choice
A) employee-sponsored network access
B) faster device onboarding
C) guest access and activity tracking
D) accelerated security options
E) site-to-site VPNs
F) clientless network access
Correct Answer
verified
Multiple Choice
A) <installer package name> /desktopicon 0 /startmenu 1 /contextmenu 1 /skipdfc 0 /skiptetra 0
B) <installer package name> /desktopicon 1 /startmenu 0 /contextmenu 0 /skipdfc 0 /skiptetra 0
C) <installer package name> /desktopicon 0 /startmenu 0 /contextmenu 0 /skipdfc 1 /skiptetra 1
D) <installer package name> /desktopicon 1 /startmenu 0 /contextmenu 0 /skipdfc 0 /skiptetra 1
Correct Answer
verified
Multiple Choice
A) time-to-value
B) protection
C) control
D) scalability
E) flexibility
F) agility
Correct Answer
verified
Multiple Choice
A) URL filtering
B) retrospective security
C) attack chain weaving
D) breach hunting
E) trajectory
F) behavioral indications of compromise
Correct Answer
verified
Multiple Choice
A) Content Security
B) Cloud Security
C) Network Security
D) Access Security
E) Data Center Security
F) Internet Security
G) Advanced Malware Protection
Correct Answer
verified
Showing 21 - 40 of 227
Related Exams