Question 6 of 948
Which definition of a process in Windows is true?
    Correct Answer: A

Question 7 of 948
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?
    Correct Answer: A

    An exploit kit is a type of toolkit used by cybercriminals to exploit security holes in software applications, typically by hosting the kit on malicious websites or by injecting it into compromised, otherwise legitimate websites. When users visit these websites, the exploit kit automatically scans for software vulnerabilities and attempts to exploit them to deliver malicious payloads, such as malware. This makes exploit kits the correct answer for a tool used by threat actors on a webpage to exploit software vulnerabilities and spread malware.

Question 8 of 948
Which encryption algorithm is the strongest?
    Correct Answer: A

Question 9 of 948
In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?
    Correct Answer: C

Question 10 of 948
Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)
    Correct Answer: A, D