00:00

QUESTION 31

Which Linux file lists every process that starts at boot time?

Correct Answer: D

QUESTION 32

Which of the following best describes the level of risk associated with using proprietary crypto algorithms.?

Correct Answer: B

QUESTION 33

Which of the following is the FIRST step in performing an Operational Security (OP5EC) Vulnerabilities Assessment?

Correct Answer: E

QUESTION 34

Which choice best describes the line below?
alert tcp any any -> 192.168.1.0/24 80 (content: /cgi-bin/test.cgi"; msg: "Attempted
CGI-BIN Access!!";)

Correct Answer: D

QUESTION 35

Which of the following protocols work at the Session layer of the OSI model? Each correct
answer represents a complete solution. Choose all that apply.

Correct Answer: AB