
0 of 17 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 17 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
| Average score |
|
| Your score |
|
File fingerprinting, scanning, string searches, and disassembly are all used to identify malware. When these techniques are used, what is the identifying information called?
You are the security analyst for your organization. You have noticed that an attacker has gotten past the network’s firewall by modifying the addressing information in IP packet headers to make it look like the packets are coming from a trusted source.
Which of the following is the MOST likely firewall evasion technique the attacker is using?

Which of the following should be implemented as protection against malware attacks?
Which of the following is a mechanism that guards data going in and out of your network?
You have run the ls -l command the output generated reads:
-rwx r-x r– root mbuna
Which of the following statements is true?
While reviewing your pfSense appliance logs, you notice the following.
What is happening?

Fabrice, a security analyst, is tasked with monitoring a company’s threat feed. Which of the following should he look for as part of his analysis?
The following image is of DHCP logs on a pfSense appliance.
What is happening here?

When you create an event subscription, events are sent from one computer to another. What is the computer that receives the events called?
You are setting up a Windows machine as a collector to handle event subscriptions from other machines. You have dozens of machines to collect from, and you have configured the receiving machine.
What do you need to do next?

Which of the following tools allows a domain owner to specify email servers that can send an email in the domain, and which servers are not allowed to send emails?
Which of the following firewall technologies operates on Layer 5 of the OSI model?
Which of the following BEST describes continuous integration?
In order to perform testing of various websites for your company, you are using Burpsuite. What function allows Burpsuite to collect so much information about a client/server communication stream?

Which of the following is true about rule-writing?
Tokenization is another effective tool in data loss prevention. Which of the following does tokenization do? (Select two.)
WhatsApp us