100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SANS SEC 275 EXAM QUESTIONS AND ANSWERS 100% PASS

Rating
-
Sold
-
Pages
67
Grade
A+
Uploaded on
09-01-2026
Written in
2025/2026

SANS SEC 275 EXAM QUESTIONS AND ANSWERS 100% PASS

Institution
SANS SEC 275
Module
SANS SEC 275











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS SEC 275
Module
SANS SEC 275

Document information

Uploaded on
January 9, 2026
Number of pages
67
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS SEC 275 EXAM QUESTIONS AND
ANSWERS 100% PASS



/ qn - ANS Don't launch with a graphical user interface.


/i - ANS Don't try to run as administrator, run as a normal user instead (this won't matter
because of AlwaysInstallElevated).


/quiet - ANS Don't show the user any messages.


1024?! - ANS 1 kilobyte = 1024 bytes. IEC introduced KiB instead: 1 byte is 8 bits. 1 kibibyte
(KiB) is 1024 bytes. 1 mebibyte (MiB) is 1024 kibibytes. 1 gibibyte (GiB) is 1024 mebibytes. 1
tebibyte (TiB) is 1024 gibibytes.


Active Directory - ANS A system that allows the server to communicate with Windows
desktops, allowing the administrator to easily configure all the connected desktops from one
location, amongst other uses which we will cover in future modules. Active Directory allows
administrators to configure settings on Windows desktops that are connected to a Windows
server.


Adding a new user - ANS Adding a new user is as simple as running: net user /add
<username> <password> This command will create a new user and set the password to what
you specified. You can do so much more when creating users this way, such as configuring
account expiry and setting times where the account can log on.


Add-ins - ANS Microsoft Word allows for third parties to write 'add-ins', which extend the
functionality of Microsoft Word.


1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

,Advanced Memory Forensics with Volatility - ANS Volatility is one of the most widely used
memory forensics tools. Useful Volatility commands: imageinfo - vol.py or volatility -f
memdump.mem imageinfo


Aliases - ANS PowerShell comes with several aliases set up for common cmdlets. cat, cd, dir,
ls, rm


Alternate Number Bases - ANS We are very used to counting in base 10, but other number
bases like base 16 (hex) or base 2 (binary) are incredibly useful in computing.


Alternative Search Engines - ANS No two search engines are the same. Alternative Search
Engines - Google, Bing, Yahoo, DuckDuckGo, archive.org


AlwaysInstall Elevated - ANS Some administrators will configure this so that users can install
software on their computers without administrator approval.


Analytics - ANS Collecting stats and analysing interactions on a web server.


Anti Forensics - ANS Cyber criminals improve and modify their operational security (OpSec) in
order to avoid being caught. NotPetya is part of the Petya family of encrypting ransomware that
targets Microsoft Windows based systems.


APFS - ANS The Apple File System supports permissions and encryption, and duplicate files
can be stored without using additional space, with changes to one copy of a file being saved as a
delta (the difference between the old file and the new file) to lower space requirements.


Application Layer - ANS An example of an application layer protocol is something like HTTP or
FTP. HTTP GET request is an application layer protocol because the web browser will form the
request necessary for displaying a page or submitting a form.




2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

,apropos - ANS The 'apropos' tool is used to search man pages for keywords, usually to find
the 'appropriate' tool to use in a particular situation. The 'apropos' command is used to find the
'appropriate' tool for a particular job.


apt-get - ANS The apt command is incredibly useful to rapidly find, install, or remove
software. The way 'apt' works is by having a list of 'sources'; these are servers which contain
information about available packages, download links and version information. 'apt update' only
updates the list of available packages.


Arguments - ANS The 'argc' variable is an integer which contains the number of arguments
passed to the program when it was executed. The 'argv' array contains the data passed in.


Arithmetic Logic Unit (ALU) - ANS The Arithmetic Logic Unit is the part of the CPU responsible
for performing arithmetic and logical operations.


ARP - ANS The Address Resolution Protocol translates IP addresses to MAC addresses for
transmission purposes. ARP is only for the local network.


ARP Cache - ANS ARP (address resolution protocol) is a protocol used on local networks to
map IP addresses to MAC addresses. When a computer receives an ARP response, it saves it
into the ARP cache.


ARP Spoofing / Poisoning - ANS The flaw in the ARP protocol comes because, if an ARP
response is sent to a computer, it will store that value in its ARP cache even if it didn't make an
ARP request asking for a response.


Arrays - ANS In C, you have to specify the type of the array when you create it, and it can only
ever hold that type of data. You can't mix and match within the same array.


AS - ANS The AS keyword is used to assign an alias to a table or field.They are used to make
long SQL statements more readable, more descriptive or set the table headings for a query to
make the results more descriptive.



3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

, ASCII - ANS American Standard Code for Information Interchange. A table that maps binary to
characters. Originally 7 bits wide for up 127 characters. Now is 8 bits wide and up to 255
characters.


ASLR - ANS Address Space Layout Randomisation is a protection that involves randomising
the memory addresses that a program gets loaded into on each run.


Assertions - ANS The assert function will cause the program to crash with the error message
we provided if a condition is not met.


Asymmetric cryptography - ANS Asymmetric cryptography, you have two keys, a public and a
private. You can lock the message with whichever one you would like, but you must unlock it
with the opposite key.


Asymmetric Encryption - ANS Asymmetric encryption: every party generates two encryption
keys: one is private and one is public. The public encryption key is the one you send to whoever
needs to communicate with you securely. The private encryption key should remain private only
to you.


Audio Steganography - ANS Audio steganography is a technique used to embed secret
messages into digital audio. There are various methods of audio steganography, such as LSB and
Echo Hiding.


Authoritative Name Servers - ANS A name server that is authoritative for a domain is one
that controls the mapping between the domain name and the IP address. It has the final say on
where the domain points.


Authoritative nameserver - ANS The authoritative nameserver will retrieve the specific IP
address of the origin server for the provided web domain name, which the resolver will pass
back to the client.


Automatically Decoding Encoding - ANS The purpose of encoding is to enable us to fit data
that we need to store or transmit within a set of constraints that are suitable to the storage or
transmission medium. Encoding is often used with encryption to make the results transmissible.

4 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Fyndlay Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
357
Member since
1 year
Number of followers
80
Documents
18669
Last sold
1 day ago
Scholar\'s Sanctuary.

Explore a Vast Collection of Finely Made Learning Materials.

3.7

68 reviews

5
32
4
8
3
13
2
6
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions