Created by - Mary Smith
Questions 1. You have an Ec2 Instance in a private subnet which needs to access the KMS service. Which of the below methods can help fulfill this requirement keeping security in perspective Please select:A) Use a VPC endpointB) Use VPC PeeringC) Attach a VPN connection to the VPCD) Attach an Internet gateway to the subnet2. Your company has a set of 1000 EC2 Instances defined in an AWS(Amazon Web Service) Account. They want to effectively automate several administrative tasks on these instances. Which of the following would be an effective way to achieve this?A) Use the AWS(Amazon Web Service) InspectorB) Use the AWS(Amazon Web Service) Systems Manager Run CommandC) Use the AWS(Amazon Web Service) Systems Manager Parameter StoreD) Use AWS(Amazon Web Service) Config (Incorrect)3. A company has a legacy application that outputs all logs to a local text file. Logs from all applications running on AWS(Amazon Web Service) must be continually monitored for security related messages. What can be done to allow the company to deploy the legacy application on Amazon EC2 and still meet the monitoring requirement?A) Install the Amazon Inspector agent on any EC2 instance running the legacy application. Generate CloudWatch alerts based on any Amazon Inspector findings. (Incorrect)B) Create a Lambda function that mounts the EBS volume with the logs and scans the logs for security incidents. Trigger the function every 5 minutes with a scheduled Cloudwatch event.C) Send the local text log files to CloudWatch Logs and configure a CloudWatch metric filter. Trigger cloudWatch alarms based on the metrics.D) Export the local text log files to CloudTrail. Create a Lambda function that queries the CloudTrail logs for security incidents using Athena.4. You have a web site that is sitting behind AWS(Amazon Web Service) Cloud front. You need to protect the web site against threats such as SQL injection and Cross site scripting attacks. Which of the following service can help in such a scenario Please select:A) AWS WAFB) AWS InspectorC) AWS ConfigurationD) AWS Trusted Advisor5. You are responsible to deploying a critical application onto AWS. Part of the requirements for this application is to ensure that the controls set for this application met PCI compliance. Also there is a need to monitor web application logs to identify any malicious activity. Which of the following services can be used to fulfil this requirement. Choose 2 answers from the options given below(Select 2answers)A) Amazon Cloudwatch LogsB) Amazon AWS(Amazon Web Service) ConfigC) Amazon VPC Flow LogsD) Amazon Cloudtrail Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: The AWS(Amazon Web Service) Documentation mentions the following AWS Systems Manager Run Command lets you remotely and securely manage the configuration of your managed instances. A managed instance is any Amazon EC2 instance or on-premises machine in your hybrid environment that has been configured for Systems Manager. Run Command enables you to automate common administrative tasks and perform ad hoc configuration changes at scale. You can use Run Command from the AWS(Amazon Web Service) console, the AWS(Amazon Web Service) Command Line Interface, AWS(Amazon Web Service) Tools for Windows PowerShell, or the AWS(Amazon Web Service) SDKs. Run Command is offered at no additional cost. Option A is invalid because this service is used to store parameters Option C is invalid because this service is used to scan vulnerabilities in an EC2 Instance. Option D is invalid because this service is used to check for configuration changes For more information on executing remote commands, please visit the below URL https://docs.aws.amazon.com/systems-manager/latest/userguide/execute-remote-commands.html3. Right Answer: CExplanation: One can send the log files to Cloudwatch Logs. Log files can also be sent from On-premise servers. You can then specify metrics to search the logs for any specific values. And then create alarms based on these metrics. Option A is invalid because this will be just a long over drawn process to achieve this requirement Option C is invalid because AWS(Amazon Web Service) Inspector cannot be used to monitor for security related messages. Option D is invalid because files cannot be exported to AWS(Amazon Web Service) Cloudtrail For more information on Cloudwatch logs agent, please visit the below URL https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/QuickStartEC2Instance.html4. Right Answer: AExplanation: 5. Right Answer: A,DExplanation: The AWS(Amazon Web Service) Documentation mentions the following about these services AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS(Amazon Web Service) account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS(Amazon Web Service) infrastructure. CloudTrail provides event history of your AWS(Amazon Web Service) account activity, including actions taken through the AWS(Amazon Web Service) Management Console, AWS(Amazon Web Service) SDKs, command line tools, and other AWS(Amazon Web Service) services. This event history simplifies security analysis, resource change tracking, and troubleshooting. Option B is incorrect because VPC flow logs can only check for flow to instances in a VPC Option C is incorrect because this can check for configuration changes only For more information on Cloudtrail, please refer to below URL https://aws.amazon.com/cloudtrail/ You can use Amazon CloudWatch Logs to monitor, store, and access your log files from Amazon Elastic Compute Cloud (Amazon EC2) instances, AWS(Amazon Web Service) CloudTrail, Amazon Route 53, and other sources. You can then retrieve the associated log data from CloudWatch Logs. For more information on Cloudwatch logs, please refer to below URL http://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following statement correctly describes difference between packet filtering firewall and stateful inspection firewall?A) Packet filtering firewall do not maintain client session whereas Stateful firewall maintains client session.B) Packet filtering firewall and Stateful firewall both maintain session of client.C) Packet filtering firewall is a second generation firewall whereas Stateful is a first generation of firewall.D) Packet filtering firewall and Stateful firewall do not maintain any session of client.2. There are many firewall implementations provided by firewall manufacturers. Which of the following implementation utilize two packet filtering routers and a bastion host? This approach creates the most secure firewall system since it supports network and application level security while defining a separate DMZ.A) Dual Homed firewallB) Screened subnet firewallC) Screened host firewallD) Anomaly based firewall3. Which of the following type of IDS has self-learning functionality and over a period of time will learned what is the expected behavior of a system?A) Signature Based IDSB) Host Based IDSC) Neural Network based IDSD) Statistical based IDS4. Which of the following type of an IDS resides on important systems like database, critical servers and monitors various internal resources of an operating system?A) Signature based IDSB) Host based IDSC) Network based IDSD) Statistical based IDS5. There are many known weaknesses within an Intrusion Detection System (IDS). Which of the following is NOT a limitation of an IDS?A) Weakness in the identification and authentication scheme.B) Application level vulnerability.C) Backdoor into applicationD) Detect zero day attack. Right Answer and Explanation: 1. Right Answer: AExplanation: Packet Filtering Firewall -Also Known as First Generation FirewallDo not maintain client session -The advantage of this type of firewall are simplicity and generally stable performance since the filtering rules are performed at the network layer.Its simplicity is also disadvantage, because it is vulnerable to attack from improperly configured filters and attack tunneled over permitted services.Some of the more common attack on packet filtering are IP Spoofing, Source Routing specification, Miniature fragment attack.Stateful Inspection Firewall -A stateful inspection firewall keep track of the destination IP address of each packet that leaves the organization's internal network.The session tracking is done by mapping the source IP address of incoming packet with the list of destination IP addresses that is maintained and updatedThis approach prevent any attack initiated and originated by outsider.The disadvantage includes stateful inspection firewall can be relatively complex to administer as compare to other firewall.The following were incorrect answers:All other choices presented were incorrect answers because they all had the proper definition.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 345 and 3462. Right Answer: BExplanation: In network security, a screened subnet firewall is a variation of the dual-homed gateway and screened host firewall. It can be used to separate components of the firewall onto separate systems, thereby achieving greater throughput and flexibility, although at some cost to simplicity. As each component system of the screened subnet firewall needs to implement only a specific task, each system is less complex to configure.A screened subnet firewall is often used to establish a demilitarized zone (DMZ).Below are few examples of Firewall implementations:Screened host Firewall -Utilizing a packet filtering router and a bastion host, this approach implements a basic network layer security and application server security.An intruder in this configuration has to penetrate two separate systems before the security of the private network can be compromisedThis firewall system is configured with the bastion host connected to the private network with a packet filtering router between internet and the bastion hostDual-homed Firewall -A firewall system that has two or more network interface, each of which is connected to a different networkIn a firewall configuration, a dual homed firewall system usually acts to block or filter some or all of the traffic trying to pass between the networkA dual-homed firewall system is more restrictive form of screened-host firewall systemDemilitarize Zone (DMZ) or screened-subnet firewallUtilizing two packet filtering routers and a bastion hostThis approach creates the most secure firewall system since it supports network and application level security while defining a separate DMZ networkTypically, DMZs are configured to limit access from the internet and organization's private network.The following were incorrect answers:The other types of firewall mentioned in the option do not utilize two packet filtering routers and a bastion host.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 3463. Right Answer: CExplanation: Neural Network based IDS monitors the general patterns of activity and traffic on the network, and create a database of normal activities within the system. This is similar to statistical model but with added self-learning functionality.Also, you should know below categories and types of IDS for CISA exam:An IDS works in conjunction with routers and firewall by monitoring network usage anomalies.Broad category of IDS includes:Network based IDS -Host based IDS -Network Based IDS -They identify attack within the monitored network and issue a warning to the operator.If a network based IDS is placed between the Internet and the firewall, it will detect all the attack attempts whether or not they enter the firewallHost Based IDS -They are configured for a specific environment and will monitor various internal resources of the operating system to warn of a possible attack.They can detect the modification of executable programs, detect the detection of files and issue a warning when an attempt is made to use a privilege account.Types of IDS includes -Signature Based IDS '' These IDS system protect against detected intrusion patterns. The intrusive pattern they can identify are stored in the form of signature.Statistical Based IDS '' This system needs a comprehensive definition of the known and expected behavior of systemNeural Network '' An IDS with this feature monitors the general patterns of activity and traffic on the network, and create a database. This is similar to statistical model but with added self-learning functionalityThe following were incorrect answers:The other types of IDS mentioned in the options do not monitor general patterns of activities and contains self-learning functionalities.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 346 and 3474. Right Answer: BExplanation: Host Based IDS resides on important systems like database, critical servers and monitors various internal resources of an operating system.Also, you should know below mentioned categories and types of IDS for CISA examAn IDS works in conjunction with routers and firewall by monitoring network usage anomalies.Broad categories of IDS include:1. Network Based IDS2. Host Based IDSNetwork Based IDS -They identify attack within the monitored network and issue a warning to the operator.If a network based IDS is placed between the Internet and the firewall, it will detect all the attack attempts whether or not they enter the firewallNetwork Based IDS are blinded when dealing with encrypted trafficHost Based IDS -They are configured for a specific environment and will monitor various internal resources of the operating system to warn of a possible attack.They can detect the modification of executable programs, detect the detection of files and issue a warning when an attempt is made to use a privilege account.They can monitor traffic after it is decrypted and they supplement the Network Based IDS.Types of IDS includes:Statistical Based IDS '' This system needs a comprehensive definition of the known and expected behavior of systemNeural Network '' An IDS with this feature monitors the general patterns of activity and traffic on the network, and create a database. This is similar to statistical model but with added self-learning functionality.Signature Based IDS '' These IDS system protect against detected intrusion patterns. The intrusive pattern they can identify are stored in the form of signature.The following were incorrect answers:The other types of IDS mentioned in the options do not resides on important systems like database and critical serversThe following reference(s) were/was used to create this question:CISA review manual 2014 Page number 346 and 3475. Right Answer: DExplanation: Detecting zero day attack is an advantage of IDS system making use of behavior or heuristic detection.It is important to read carefully the question. The word 'NOT' was the key word.Intrusion Detection System are somewhat limited in scope, they do not address the following:Weakness in the policy definitionApplication-level vulnerability -Backdoor within application -Weakness in identification and authentication schemesAlso, you should know the information below for your CISA exam:An IDS works in conjunction with routers and firewall by monitoring network usage anomalies.Broad category of IDS includes:1. Network Based IDS2. Host Based IDSNetwork Based IDS -They identify attack within the monitored network and issue a warning to the operator.If a network based IDS is placed between the Internet and the firewall, it will detect all the attack attempts whether or not they enter the firewallNetwork Based IDS are blinded when dealing with encrypted trafficHost Based IDS -They are configured for a specific environment and will monitor various internal resources of the operating system to warn of a possible attack.They can detect the modification of executable programs, detect the detection of files and issue a warning when an attempt is made to use a privilege account.They can monitor traffic after it is decrypted and they supplement the Network Based IDS.Types of IDS includes:Statistical Based IDS '' This system needs a comprehensive definition of the known and expected behavior of systemNeural Network '' An IDS with this feature monitors the general patterns of activity and traffic on the network, and create a database. This is similar to statistical model but with added self-learning functionality.Signature Based IDS '' These IDS system protect against detected intrusion patterns. The intrusive pattern they can identify are stored in the form of signature.The following were incorrect answers:The other options mentioned are all limitations of an IDS.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 346 and 347 .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. The final acceptance testing of a new application system should be the responsibility of the:A) IS audit team.B) user groupC) IS managementD) quality assurance team2. Which of the following is MOST important when an organization contracts for the long-term use of a custom-developed application?A) Documented coding standardsB) Error correction managementC) Contract renewal provisionsD) Escrow clause3. Which should be reviewed FIRST by an IS auditor to ensure that data is being secured appropriately for an application?A) Data classificationB) Data encryptionC) Data accessD) Data storage4. Which of the following would a digital signature MOST likely prevent?A) CorruptionB) Unauthorized changeC) RepudiationD) Disclosure5. A computer program used by multiple departments has data quality issues. There is no agreement as to who should be responsible for corrective action. Which of the following is an IS auditor's BEST course of action?A) Recommend the IT department be assigned data cleansing responsibility.B) Modify the program to automatically cleanse the data and close the issue.C) Assign responsibility to the primary department using the program.D) Note the disagreement and recommend establishing data governance. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: Data classification is necessary to provide proper access rights to the users. If you do not classify data according to their sensitivity and importance to the business, you cannot apply proper access rules to them. Data owners are responsible for defining access rules. The data classification process starts with the process of establishing ownership of data. This process also helps to prepare data dictionary4. Right Answer: AExplanation: The main reason of using digital signature is to ensure message integrity.it also helps to ensure authenticity and non-repudiation of the message. A digital signature can never ensure the confidentiality of data5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. When developing an incident response plan, which of the following is the MOST effective way to ensure incidents common to the organization are handled properly?A) Adopting industry standard response proceduresB) Rehearsing response scenariosC) Conducting awareness trainingD) Creating and distributing a personnel call tree2. Following a successful and well-publicized hacking incident, an organization has plans to improve application security.Which of the following is a security project risk?A) Critical evidence may be lost.B) The reputation of the organization may be damaged.C) A trapdoor may have been installed in the application.D) Resources may not be available to support the implementation.3. Which of the following BEST validates that security controls are implemented in a new business process?A) Assess the process according to information security policy.B) Benchmark the process against industry practices.C) Verify the use of a recognized control framework.D) Review the process for conformance with information security best practices.4. Which of the following is MOST important when prioritizing an information security incident?A) Organizational risk toleranceB) Cost to contain and remediate the incidentC) Critically of affected resourcesD) Short-term impact to shareholder value5. A multinational organization wants to ensure its privacy program appropriately addresses privacy risk throughout its operations.Which of the following would be of MOST concern to senior management?A) The organization uses a decentralized privacy governance structure.B) Privacy policies are only reviewed annually.C) The organization does not have a dedicated privacy officer.D) The privacy program does not include a formal training component. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone-s knowledge. Which of the following would prevent this from occurring?A) A. Change to user MAC filteringB) B. Change default usernames and passwordsC) C. Disable the SSID from broadcastingD) D. Enable static IP addresses2. A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario?A) A. Remote desktopB) B. Remote assistanceC) C. telnetD) D. FTP3. Which of the following would a technician use to search for a specific string within a file name?A) A. grepB) B. chmodC) C. wgetD) D. sudo4. When securing a mobile device, which of the following types of screen locks is the MOST secure?A) A. Fingerprint lockB) B. Swipe lockC) C. Pass-code lockD) D. Face lock5. A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?A) A. extractB) B. diskpartC) C. bootrecD) D. chkdsk Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional steps will help to secure the network?(Select TWO).(Select 2answers)A) A. Disable SSID broadcast.B) B. Refresh the MAC address.C) C. Filter the MAC address.D) D. Refresh the IP address.E) E. Use CAT6 cables.2. When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?A) A. Additional softwareB) B. Date and time settingsC) C. Peripheral devicesD) D. Security software3. Which of the following is the BEST reason to backup data?A) A. To ensure data encryptionB) B. To ensure data stabilityC) C. To ensure data securityD) D. To ensure data availability4. Which of the following is a safety feature of cloud-based backups?A) A. Incremental copy of dataB) B. Local copy of dataC) C. Offsite storage of dataD) D. Full backup of PC data5. A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on. Which of the following should the technician do FIRST to identify the issue?A) A. Check for physical damage on the computer.B) B. Search for a solution on the Internet.C) C. Reference the manufacturer's documentation.D) D. Ensure the power supply is set at the correct voltage. Right Answer and Explanation: 1. Right Answer: A,CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?A) DMZB) NATC) VPND) PAT2. A network operations manager has added a second row of server racks in the datacenter. These racks face the opposite direction of the first row of racks. Which of the following is the reason the manager installed the racks this way?A) To lower energy consumption by sharing power outletsB) To create environmental hot and cold islesC) To eliminate the potential for electromagnetic interferenceD) To maximize fire suppression capabilities3. A network technician is setting up a segmented network that will utilize a separate ISP to provide wireless access to the public area for a company. Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network?A) Pre-shared keyB) EnterpriseC) Wi-Fi Protected setupD) Captive portal4. A network technician is trying to determine the source of an ongoing network based attack. Which of the following should the technician use to view IPv4 packet data on a particular internal network segment?A) ProxyB) Protocol analyzerC) SwitchD) Firewall5. A new Chief Information Officer (CIO) has been reviewing the badging and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy?A) PhysicalB) CorrectiveC) TechnicalD) Administrative Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following warehousing tools enables wireless scanning of products?A) Magnetic stripesB) Universal product codesC) Radio frequency devicesD) Local area network2. A manufacturer and the distributors of its products have decided to focus on price and product availability as strategic priorities. Which of the following values would be the most appropriate measure of customer service?A) Manufacturer's volume flexibilityB) Order-fulfillment lead timesC) Distributors' order-fill ratesD) Supply chain inventory days of supply3. The best way to manage a business relationship is to measure performance to:A) cost of ownership metrics.B) quality targets.C) on-time delivery.D) agreed-upon metrics.4. What are the steps in the supplier relationship process?A) Measure, fulfill, document, modelB) Source, document, manageC) Measure, procure, fulfill, modelD) Source, procure, fulfill, manage5. The strategy to implement supplier relationship management has been developed. The most appropriate next step is to:A) develop criteria for prospective partners.B) develop policies for alliances.C) select initial partners.D) conduct a pilot implementation. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which two event types can the eStreamer server transmit to the requesting client from a managed device and a management center? (Choose two.)(Select 2answers)A) file eventsB) intrusion eventsC) intrusion event extra dataD) user activity events2. What is the purpose of the snapshot APIs exposed by Cisco Stealthwatch Cloud?A) Operate and return alerts discovered from infrastructure observationsB) Return current configuration data of Cisco Stealthwatch Cloud infrastructureC) Report on flow data during a customizable time period.D) Create snapshots of supported Cisco Stealthwatch Cloud infrastructure3. A security network engineer must implement intrusion policies using the Cisco Firepower Management Center API. Which action does the engineer take to achieve the goal?A) Make a POST request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies.B) Make a PATCH request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies.C) Intrusion policies can be read but not configured using the Cisco Firepower Management Center API.D) 4. What are two capabilities of Cisco Firepower Management Center eStreamer? (Choose two.)(Select 2answers)A) eStreamer is used to send intrusion event dataB) eStreamer is used to get sources for intelligence services.C) eStreamer is used to send malware event dataD) eStreamer is used to get a list of access control policies5. Which step is required by Cisco pxGrid providers to expose functionality to consumer applications that are written in Python?A) Look up the existing service using the /pxgrid/control/ServiceLookup endpoint.B) Configure the service using the /pxgrid/ise/config/profiler endpointC) Expose the service using the /pxgrid/ise/pubsub endpointD) Register the service using the /pxgrid/control/ServiceRegister endpoint Right Answer and Explanation: 1. Right Answer: B,CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: A,CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review