00:00

QUESTION 66

Which threats are directly associated with malware? Select that apply.

Correct Answer: C

QUESTION 67

4 Embedded systems and network-enabled devices that communicate with the internet are considered as

Correct Answer: C

QUESTION 68

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which one of the following controls would BEST achieve his objective?

Correct Answer: A

QUESTION 69

Which of the following best describes the type of technology the team should implement to increase the work effort of buffer overflow attacks?

Correct Answer: A

QUESTION 70

Some Employee of his organization launched a privilege escalation attack to gain root access on one of the organization's database serversiThe employee does have an authorized user account on the server. What log file would be MOST likely to contain relevant information??

Correct Answer: C