00:00

QUESTION 16

Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?

Correct Answer: C

QUESTION 17

Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.

Correct Answer: BC

QUESTION 18

Which of the following steps of incident response is steady in nature?

Correct Answer: C

QUESTION 19

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

Correct Answer: A

QUESTION 20

CORRECT TEXT
Fill in the blank with the appropriate term.
_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another

Correct Answer: Egressfiltering