Topic 1: Exam Pool A
What network security concept requires multiple layers of security controls to be placed
throughout an IT infrastructure, which improves the security posture of an organization to
defend against malicious attacks or potential vulnerabilities?
What kind of Web application vulnerability likely exists in their software?
A.
Host-Based Intrusion Detection System
B.
Security through obscurity
C.
Defense in depth
D.
Network-Based Intrusion Detection System
Defense in depth
What does the -oX flag do in an Nmap scan?
A.
Perform an express scan
B.
Output the results in truncated format to the screen
C.
Perform an Xmas scan
D.
Output the results in XML format to a file
Output the results in XML format to a file
An attacker scans a host with the below command. Which three flags are set? (Choose
three.)
#nmap –sX host.domain.com
A.
This is ACK scan. ACK flag is set
B.
This is Xmas scan. SYN and ACK flags are set
C.
This is Xmas scan. URG, PUSH and FIN are set
D.
This is SYN scan. SYN flag is set
This is Xmas scan. URG, PUSH and FIN are set
Which of the following options represents a conceptual characteristic of an anomaly-based
IDS over a signature-based IDS?
A.
Produces less false positives
B.
Can identify unknown attacks
C.
Requires vendor updates for a new threat
D.
Cannot deal with encrypted network traffic
Can identify unknown attacks
Why containers are less secure that virtual machines?
A.
Host OS on containers has a larger surface attack.
B.
Containers may full fill disk space of the host.
C.
A compromise container may cause a CPU starvation of the host.
D.
Containers are attached to the same virtual network.
Host OS on containers has a larger surface attack.
Page 12 out of 147 Pages |
Previous |