material questions with verified answers
A repository of security-related documentation and also sponsors a
number of security research projects Ans✓✓✓SANS Institute
A system is experiencing very high consumption of bandwidth during a
time when there should not be a heavy workload on the device, with
which issue should you be most concerned? Ans✓✓✓DoS Attack
A type of database recording system that is difficult or impossible to
change, hack, or cheat? Ans✓✓✓Blockchain
A user clicks on a offer to install a web browser toolbar that is supposed
to provide helpful shortcuts, side affect, it changed his default search
engine to one owned by that company. What kind of malware is that a
example of? Ans✓✓✓Grayware
Attack targeted a file srevers Ans✓✓✓Directory traversal attack
attacks on switch, what is an attack targeted at switches?
Ans✓✓✓MAC overflow
Block Cipher that uses a variable-length key ranging from 32 to 448 bits
Ans✓✓✓Blowfish
, CIA explains the three pillars of security, the ¨I¨ in CIA stands for
Ans✓✓✓Integrity
Commands is used to change permissions on files Ans✓✓✓chmod
Contains artifacts from Microsofts Edge web browser
Ans✓✓✓WebcacheV01.dat
Crafting email and websites to specifically target certain victims is
called dive bombing, True or False? Ans✓✓✓False
Develops associated with an APK file Ans✓✓✓Android
Digital forensic investigation, the documentation work preformed was
shoddy, stocking the forensic kit with the proper forms, which form
should be used the describe the incident in detail? Ans✓✓✓Incident
Form
DNS harvesting evidence Ans✓✓✓a unauthorized request for a zon
transfer from the DNS server
Documents company´s risk appetite regularly requirements, technical
constraints, and workflow. Which step of the information security
vulnerability management process are you completing
Ans✓✓✓Establish the scanning frequency