Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?
Correct Answer:
C
Which security technology allows only a set of pre-approved applications to run on a system?
Correct Answer:
C
Which regular expression is needed to capture the IP address 192.168.20.232?
Correct Answer:
A
Refer to the exhibit.
An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?
Correct Answer:
C
Indirect=circumstantail so there is no posibility to match A or B (only one answer is needed in this question). For suer it's not a BEST evidence - this FW data inform only of DROPPED traffic. If smth happend inside network, presented evidence could be used to support other evidences or make our narreation stronger but alone it's mean nothing.
In a SOC environment, what is a vulnerability management metric?
Correct Answer:
C