Which definition of a fork in Linux is true?
Correct Answer:
D
🗳️
Which identifier is used to describe the application or process that submitted a log message?
Correct Answer:
D
🗳️
Reference:
https://www.tutorialspoint.com/unix/unix-system-logging.htm
Which protocol is expected to have a user agent, host, and referrer header in a packet capture?
Correct Answer:
B
🗳️
Which evasion method involves performing actions slower than normal to prevent detection?
Correct Answer:
C
🗳️
Reference:https://books.google.com/books?id=KIwLSddtAWsC&pg=PA58&lpg=PA58&dq=timing+attack+performing+actions+slower+than+normal+to+prevent
+detection&source=bl&ots=9qu7ywV-mX&sig=_9lwcDDq-
WNaYlEeP7VkR0MPAOE&hl=en&sa=X&ved=0ahUKEwiRwo_P8vvRAhVKyoMKHaUlAUQQ6AEIITAB#v=onepage&q=timing%20attack%20performing%
20actions%20slower%20than%20normal%20to%20prevent%20detection&f=false
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Correct Answer:
B
🗳️
Which definition of permissions in Linux is true?
Correct Answer:
D
🗳️
Which definition describes the main purpose of a Security Information and Event Management solution?
Correct Answer:
D
🗳️
If a web server accepts input from the user and passes it to a bash shell, to which attack method if it vulnerable?
Correct Answer:
C
🗳️
Which security monitoring data type is associated with application server logs?
Correct Answer:
D
🗳️
Which two terms are types of cross site scripting attacks? (Choose two.)
Correct Answer:
CD
🗳️