What is the virtual address space for a Windows process?
A.
physical location of an object in memory
B.
Bset of pages that reside in the physical memory
C.
system-level memory protection feature built into the operating system
D.
set of virtual memory addresses that can be used
set of virtual memory addresses that can be used
Which two compliance frameworks require that data be encrypted when it is transmitted over a public network? (Choose two.)
A.
PCI
B.
GLBA
C.
HIPAA
D.
SOX
E.
COBIT
PCI
HIPAA
What is the function of a command and control server?
A.
It enumerates open ports on a network device
B.
It drops secondary payload into malware
C.
It is used to regain control of the network after a compromise
D.
It sends instruction to a compromised system
It sends instruction to a compromised system
What is the practice of giving an employee access to only the resources needed to accomplish their job?
A.
principle of least privilege
B.
organizational separation
C.
separation of duties
D.
need to know principle
principle of least privilege
An analyst received an alert on their desktop computer showing that an attack was successful on the host.
After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the
reason for this discrepancy?
A.
The computer has a HIPS installed on it.
B.
The computer has a NIPS installed on it.
C.
The computer has a HIDS installed on it.
D.
The computer has a NIDS installed on it.
The computer has a HIDS installed on it.
Page 8 out of 37 Pages |
Previous |