Q: Complete the Qwiklab Introduction to tcpdump before answering this question. When you run the command sudo tcpdump -i eth0 -vn, what output does tcpdump provide about each packet? Select all that apply. or Q: Before responding, finish the Qwiklab Introduction to tcpdump. What output does tcpdump offer for each packet when you run the command sudo tcpdump -i eth0…
-
-
What is the combined sum of all attack vectors in a corporate network?
Q: What is the combined sum of all attack vectors in a corporate network? or Q: How many attack vectors are there in a business network all together? The risk The attack surface The antivirus software The Access Control List (ACL) Explanation: The attack surface refers to all the potential points of entry or vulnerabilities through which an attacker could…
-
What are Bastion hosts?
Q: What are Bastion hosts? or Q: Who are the hosts of Bastion? VLANs Users that have the ability to change firewall rules and configurations. A VPN subnet Servers that are specifically hardened and minimized to reduce what’s permitted to run on them. Explanation: Bastion hosts are designed to be exposed to the external network and act as a gateway…
-
Having detailed logging serves which of the following purposes? Select all that apply.
Q: Having detailed logging serves which of the following purposes? Select all that apply. or Q: Which of the following is served by having thorough logging? Choose every option that pertains. Event reconstruction Vulnerability detection Auditing Data protection Explanation: You may put together what happened during an incident by looking at detailed records, which can help you understand what happened…
-
What model does an antivirus software operate off of?
Q: What model does an antivirus software operate off of? or Q: Which model serves as the foundation for antivirus software? Greylist Blacklist Secure list Whitelist Explanation: In this model, the software identifies known malicious files or behaviors and prevents them from executing or spreading based on a list of known threats. It may also use a whitelist approach for…
-
What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen?
Q: What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen? or Q: What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen? Full disk encryption (FDE) OS upgrades Software patch management Key escrow…
-
A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running vulnerable software. Which of these helps to fix these types of vulnerabilities?
Q: A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running vulnerable software. Which of these helps to fix these types of vulnerabilities? or Q: Vulnerable software on the system was infiltrated by a hacker who took advantage of a software defect and caused unexpected behavior. Which of these…
-
When installing updates on critical infrastructure, it’s important to be what?
Q: When installing updates on critical infrastructure, it’s important to be what? or Q: What is crucial to be while installing updates on vital infrastructure? Careful Patient Calm Fast Explanation: Carefulness ensures that updates are applied correctly without disrupting critical systems, which helps to avoid potential downtime or unintended consequences.
-
What are the two primary purposes of application software policies? Select all that apply.
Q: What are the two primary purposes of application software policies? Select all that apply. or Q: What are application software policies’ two main goals? Choose every option that pertains. To help educate users on how to use software more securely Correct To take log data and convert it into different formats To use a database of signatures to identify…
-
What is a defining characteristic of a defense-in-depth strategy to IT security?
Q: What is a defining characteristic of a defense-in-depth strategy to IT security? or Q: What quality distinguishes a defense-in-depth approach to IT security? Confidentiality Multiple overlapping layers of defense Strong passwords Encryption Explanation: This approach involves implementing several layers of security controls and measures to protect information and systems. The idea is that if one layer is breached, other…