Question 11
Drag and drop the access control models from the left onto the correct descriptions on the right.


Question 12
Which two elements are assets in the role of attribution in an investigation? (Choose two.)
Question 13
What ate two denial-of-service (DoS) attacks? (Choose two)
Question 14
An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?
Question 15
What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?