Which HTTP header field is used in forensics to identify the type of browser used?
A.
referrer
B.
host
C.
user-agent
D.
accept-language
user-agent
What does an attacker use to determine which network ports are listening on a potential target device?
A.
man-in-the-middle
B.
port scanning
C.
SQL injection
D.
ping sweep
port scanning
An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.
What is the initial event called in the NIST SP800-61?
A.
online assault
B.
precursor
C.
trigger
D.
instigator
precursor
Which artifact is used to uniquely identify a detected file?
A.
file timestamp
B.
file extension
C.
file size
D.
file hash
file hash
Refer to the exhibit.
What is occurring in this network?
A.
ARP cache poisoning
B.
DNS cache poisoning
C.
MAC address table overflow
D.
MAC flooding attack
ARP cache poisoning
Page 12 out of 37 Pages |
Previous |