- (Exam Topic 2)
________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.
Correct Answer:
B
- (Exam Topic 3)
Which tool can be used to silently copy files from USB devices?
Correct Answer:
D
- (Exam Topic 3)
An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware. Which of the following tools must the organization employ to protect its critical infrastructure?
Correct Answer:
C
Source: https://www.flowmon.com
Flowmon empowers manufacturers and utility companies to ensure the reliability of their industrial networks confidently to avoid downtime and disruption of service continuity. This can be achieved by continuous monitoring and anomaly detection so that malfunctioning devices or security incidents, such as cyber espionage, zero-days, or malware, can be reported and remedied as quickly as possible.
- (Exam Topic 2)
What is the purpose of DNS AAAA record?
Correct Answer:
D
- (Exam Topic 1)
Which of the following describes the characteristics of a Boot Sector Virus?
Correct Answer:
C