What is an advantage of a system-generated password?
A. It is easy to remember.
B. It complies with the organization's password policy
C. It is very long.
D. It includes numbers and letters.
Which of the following are examples of symmetric encryption algorithms?
A. AES
B. IDEA
C. Diffie-Hellman
D. MD5
In what location (directory) do Linux-based systems store most of their logs, including syslog?
A. /opt/logs
B. /var/log
C. /etc/log
D. /dev/log
What is an advantage when deploying the Talos Intelligence Group security intelligence feed?
A. updated virus signatures for IT administrators to deploy on user end-stations.
B. updated geo-location database updates, to track malicious activities origins.
C. regular updates to ensure that the system uses up-to-date information to filter your network traffic.
D. archival intelligence feeds that are only obtained from the Internet storm center.
E. real-time cyber analytics feeds from leading governments around the globe.
What basic benchmark of an SOC is related to the cyber kill chain cycle?
A. eradicate cyber attacks
B. stop attackers at low levels of the kill chain
C. decrease time from compromise to discovery
D. find and delete CnC traffic
What is the main difference between a Layer 2 switch and a multi layer switch?
A. A multilayer switch includes Layer 3 functionality.
B. A multilayer switch can be deployed on multiple racks.
C. A Layer 2 switch is faster.
D. A Layer 2 switch uses a MAC table whereas a multilayer switch uses an ARP table.
In most Linux systems, where is the default location for the syslog or rsyslog configuration file?
A. in the /etc directory
B. in the /log/var directory
C. in the /etc/log directory
D. in the /var/log directory
Which two statements are true? (Choose two.)
A. Security engineers that need to locate vulnerabilities in a managed environment commonly use vulnerability scanners, such as Nessus and OpenVAS.
B. Attackers use vulnerability scanners such as Nessus and OpenVAS to locate vulnerabilities in potential target hosts.
C. Vulnerability scanners, such as Nessus and OpenVAS, are safe to experiment with on a production network environment.
D. Vulnerability scanners, such as Nessus and OpenVAS, should never be used on a production network for any reason.
What security management software/process is used to manage employees' mobile devices?
A. MDM
B. SIEM
C. patch management
D. log management
E. configuration management
Which of the following statements is not true about SSH?
A. SSH uses TCP port 22.
B. SSH is composed of an SSH server, clients, and keys.
C. SSH uses asymmetric encryption.
D. SSH encrypts traffic between a client and an SSH server.