Assessments

Chapter 1

Answer 1: Router

Answer 2: CHAP

Answer 3: Spoofing

Answer 4: OCTAVE-S

Answer 5: Scripting

Answer 6: Build

Answer 7: Mobile user interface

Chapter 2

Answer 1: To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Answer 2: KMIP

Answer 3: Regulatory compliance

Answer 4: SAS70

Answer 5: Data privacy

Answer 6: PaaS

Answer 7: Public

Answer 8: WPA3

Answer 9: Access point

Answer 10: Wireless traffic sniffing

Chapter 3

Answer 1: Vishing 

Answer 2: Every 30-90 days

Answer 3: Botnet

Answer 4: Botnet

Answer 5: Peer-to-peer

Answer 6: Self-replicate

Answer 7: Spear phishing 

Chapter 4

Answer 1: John the Ripper

Answer 2: Redirect

Answer 3: Determine the scope of the test

Answer 4: SQL injection

Answer 5: Nikto

Answer 6: /etc/shadow

Answer 7: Respond to telnet connection requests

Chapter 5

Answer 1: SS7

Answer 2: Support for unified communications (UC) to email, voicemail, instant messaging, video chat, and more

Answer 3: AES

Answer 4: Reverse engineering

Answer 5: Determining the vulnerabilities in the product

Answer 6: TLS

Answer 7: UART is a simple full-duplex, asynchronous, serial protocol

Chapter 6

Answer 1: Network forensics 

Answer 2: Helix

Answer 3: Tcpdump

Answer 4: PsTools

Answer 5: Snort

Answer 6: 3

Answer 7: PCAP

Answer 8: HDHOST

Answer 9: Active acquisition

Answer 10: Intercepting traffic in wireless media

Chapter 7

Answer 1: Nmap

Answer 2: What type of antivirus is in use

Answer 3: Network protocol analysis

Answer 4: LC4

Answer 5: Outline the overall authority, scope, and responsibilities of the audit function

Answer 6: Built-in substitute routing

Answer 7: Training on organizational policies and standards

Chapter 8

Answer 1: Environmental technical architecture

Answer 2: Accountability

Answer 3: Situational intelligence

Answer 4: Nation-state actor

Answer 5: Signature analysis

Answer 6: Senior management

Answer 7: Record the trace of advanced persistent threats

 

Chapter 9

Answer 1: STIX

Answer 2: Machine learning

Answer 3: Packet inspection

Answer 4: Automation

Answer 5: MTTD

Answer 6: SOAR and UEBA

Answer 7: All of the above

Answer 8: 20%

Answer 9: Deterministic

Answer 10: Shifting left

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.168.172