Question 36

A security analyst is performing a manual audit of captured data from a packet analyzer. The analyst looks forbase64 encoded strings and applies the filter http.authbasic. Which of the following describes what the analysts looking for?
  • Question 37

    A security administrator is given the security and availability profiles for servers that are being deployed.
    Match each RAID type with the correct configuration and MINIMUM number of drives.
    Review the server profiles and match them with the appropriate RAID type based on integrity, availability, I/O, storage requirements. Instructions:
    All drive definitions can be dragged as many times as necessary
    Not all placeholders may be filled in the RAID configuration boxes
    If parity is required, please select the appropriate number of parity checkboxes Server profiles may be dragged only once If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

    Question 38

    Which of the following is unique to a stream cipher?
  • Question 39

    An organization plans to implement multifactor authentication techniques within the enterprise network
    architecture. Each authentication factor is expected to be a unique control.
    Which of the following BEST describes the proper employment of multifactor authentication?
  • Question 40

    During a recent audit, several undocumented and unpatched devices were discovered on the internal network. Which of the following can be done to prevent similar occurrences?