Get Full Version of the Exam
http://www.EnsurePass.com/210-255.html
Question No.11
Which CVSSv3 Attack Vector metric value requires the attacker to physically touch or manipulate the vulnerable component?
A. |
local |
B. |
physical |
C. |
network |
D. |
adjacent |
Correct Answer: B
Question No.12
Which option has a drastic impact on network traffic because it can cause legitimate traffic to be blocked?
A. |
true positive |
B. |
true negative |
C. |
false positive |
D. |
false negative |
Correct Answer: C
Question No.13
In the context of incident handling phases, which two activities fall under scoping? (Choose two.)
A. |
determining the number of attackers that are associated with a security incident |
B. |
ascertaining the number and types of vulnerabilities on your network |
C. |
identifying the extent that a security incident is impacting protected resources on the network |
D. |
determining what and how much data may have been affected |
E. |
identifying the attackers that are associated with a security incident |
Correct Answer: CE
Question No.14
Which feature is used to find possible vulnerable services running on a server?
A. |
CPU utilization |
B. |
security policy |
C. |
temporary internet files |
D. |
listening ports |
Correct Answer: D
Question No.15
Which element is included in an incident response plan?
A. |
organization mission |
B. |
junior analyst approval |
C. |
day-to-day firefighting |
D. |
siloed approach to communications |
Correct Answer: A
Question No.16
Which option can be addressed when using retrospective security techniques?
A. |
if the affected host needs a software update |
B. |
how the malware entered our network |
C. |
why the malware is still in our network |
D. |
if the affected system needs replacement |
Correct Answer: B
Question No.17
From a security perspective, why is it important to employ a clock synchronization protocol on a network?
A. |
so that everyone knows the local time |
B. |
to ensure employees adhere to work schedule |
C. |
to construct an accurate timeline of events when responding to an incident |
D. |
to guarantee that updates are pushed out according to schedule |
Correct Answer: C
Question No.18
Which CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space?
A. |
confidentiality |
B. |
integrity |
C. |
availability |
D. |
complexity |
Correct Answer: C
Question No.19
In VERIS, an incident is viewed as a series of events that adversely affects the information assets of an organization. Which option contains the elements that every event is comprised of according to VERIS incident model#39;?
A. |
victim demographics, incident description, incident details, discovery amp; response |
B. |
victim demographics, incident details, indicators of compromise, impact assessment |
C. |
actors, attributes, impact, remediation |
D. |
actors, actions, assets, attributes |
Correct Answer: D
Question No.20
Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A. |
PCAP |
B. |
tracert |
C. |
running processes |
D. |
hard drive configuration |
E. |
applications |
Correct Answer: CE
Get Full Version of 210-255 Dumps