Which of the following are benefits of digital signatures?
A. Authentication
B. Nonrepudiation
C. Encryption
D. Hashing
Which of the following is not true about SSL VPNs?
A. SSL VPNs are used in Cisco IOS routers as a site-to-site VPN solution.
B. SSL VPNs are used in Cisco IOS routers as a remote access VPN solution.
C. SSL VPNs are used in Cisco ASA firewalls as a remote access VPN solution.
D. SSL VPNs can be client based or clientless.
Which Linux command allows you to determine if a specific process is running?
A. ps
B. watch
C. find
D. netstat
When tuning an IPS, which three determinations should help you decide whether a rule should be disabled? (Choose three.)
A. Does the alert occur frequently?
B. Does the alert generate a true positive condition?
C. If the alert is not a security incident, does it offer valuable information?
D. Does the alert pertain to your network environment?
Which of the following statements are true about application proxies?
A. Application proxies, or proxy servers, are devices that operate as intermediary agents on behalf of clients that are on a private or protected network.
B. Clients on the protected network send connection requests to the application proxy to transfer data to the unprotected network or the Internet.
C. Application proxies can be classified as next-generation firewalls.
D. Application proxies always perform network address translation (NAT).
Why is malware that runs as a Windows service more difficult for the average end user to detect?
A. because services run in the background and do not interact with the users
B. because services run in the Kernel mode
C. because services run in the User mode
D. because all services run automatically when the system boots up
What must a user do when making any changes to the logging configuration?
A. reboot the server
B. restart the logging service
C. nothing at all
D. reset the network connection
Which one of the following is the first exchange during SSHv1 authentication negotiation?
A. The server requests a username and password from the user.
B. The server sends a public key to the client.
C. The client generates a session key.
D. The client and server agree upon the encryption algorithm.
A user reports difficulties accessing certain external web pages. When examining traffic to and from the external domain in full packet captures, you notice many SYNs that have the same sequence number, source, and destination IP address, but have different payloads. Which problem is a possible explanation of this situation?
A. insufficient network resources
B. failure offull packet capture solution
C. misconfiguration of web filter
D. TCP injection
Which one of the following protocols sends data in cleartext?
A. Telnet
B. HTTPS
C. SSH
D. SCP