Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. If a system sends an alert that a user account is being hacked because of too many password failures, bur analysis shows that the

1. If a system sends an alert that a user account is being hacked because of too many password failures, bur analysis shows that the person's device had cached an old password, triggering the failures, what is this an example of?
A. False negative
B. False Postive
C. Measurement Error
D.Analysis failure
2. What is the primary limitation of a credentialed scan on a network?
A. speed
B. Examining too deeply into individual boxes
C.The inability to scale across multiple systems
D. slowing down your network with ancillary traffic
3. Which of the following is not part of SIEM processes?
A. Incident investigation
B. Event correlation
C. Data Collection
D. Alerting/ Reporting
4. What an attacker moves to a new machine and rescans the network to look for machines not previously visible, what is this technique called?
A. phasing
b. prescience
c. lateral movements
d. privilege escaltion

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Process Driven Database Design With Oracle PL SQL

Authors: Rajeev Kaula

1st Edition

1795532386, 978-1795532389

More Books

Students also viewed these Databases questions

Question

Describe the appropriate use of supplementary parts of a letter.

Answered: 1 week ago