Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?
Correct Answer:
C
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
BC
Which of the following steps of incident response is steady in nature?
Correct Answer:
C
In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?
Correct Answer:
A
CORRECT TEXT
Fill in the blank with the appropriate term.
_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another
Correct Answer:
Egressfiltering