How many bits are set aside for the fragmentation offset?
Responses
16
14
13
12
Give this one a try later!
13
What type of cloud service is characterized by the customer managing configuration
options and user provisioning and the cloud service provider managing all the other
underlying responsibilities?
Responses
Platform as a Service
Functions as a Service
,Software as a Service
Infrastructure as a Service
Give this one a try later!
Software as a Service
In order to prioritize remediation, a security analyst asks for advice from an analyst at
another company about a vulnerability identified as a severe risk. What should be kept
in mind?
Responses
Vulnerability ratings are subjective.
Vulnerability remediation will be the same for both companies.
The risk depends on attacker toolsets.
The other company might have a different vulnerability scanner.
Give this one a try later!
Vulnerability ratings are subjective.
What principle of Know Your Environment understands the value of knowing when a
senior leader's laptop data are accessed?
A. Knowing the physical design of communication
B. Knowing the flow of communication
C. Knowing the location of valuable data
D. Knowing the logical design of valuable data
Give this one a try later!
B. Knowing the flow of communication
, What penetration testing tool specifically targets the Link-Local Multicast Name
Resolution (LLMNR) service requests attempting to identify systems and credentials?
Responses
Sliver
Metasploit
Covenant
Responder
Give this one a try later!
Responder
What is a common cause of a buffer overflow attack?
Responses
No validation is performed to remove OS commands from input.
No validation is performed to remove SQL statements from input.
No validation is performed regarding encryption between the client and server.
No validation is performed to ensure copied data are not larger than allocated
memory.
Give this one a try later!
No validation is performed to ensure copied data are not larger than
allocated memory.
Which of the following OSI layers implements IP based functionality, such as time to
live and type of service?
Responses
Layer 4
Layer 3
Responses
16
14
13
12
Give this one a try later!
13
What type of cloud service is characterized by the customer managing configuration
options and user provisioning and the cloud service provider managing all the other
underlying responsibilities?
Responses
Platform as a Service
Functions as a Service
,Software as a Service
Infrastructure as a Service
Give this one a try later!
Software as a Service
In order to prioritize remediation, a security analyst asks for advice from an analyst at
another company about a vulnerability identified as a severe risk. What should be kept
in mind?
Responses
Vulnerability ratings are subjective.
Vulnerability remediation will be the same for both companies.
The risk depends on attacker toolsets.
The other company might have a different vulnerability scanner.
Give this one a try later!
Vulnerability ratings are subjective.
What principle of Know Your Environment understands the value of knowing when a
senior leader's laptop data are accessed?
A. Knowing the physical design of communication
B. Knowing the flow of communication
C. Knowing the location of valuable data
D. Knowing the logical design of valuable data
Give this one a try later!
B. Knowing the flow of communication
, What penetration testing tool specifically targets the Link-Local Multicast Name
Resolution (LLMNR) service requests attempting to identify systems and credentials?
Responses
Sliver
Metasploit
Covenant
Responder
Give this one a try later!
Responder
What is a common cause of a buffer overflow attack?
Responses
No validation is performed to remove OS commands from input.
No validation is performed to remove SQL statements from input.
No validation is performed regarding encryption between the client and server.
No validation is performed to ensure copied data are not larger than allocated
memory.
Give this one a try later!
No validation is performed to ensure copied data are not larger than
allocated memory.
Which of the following OSI layers implements IP based functionality, such as time to
live and type of service?
Responses
Layer 4
Layer 3