Question 6 of 179

DRAG DROP -
Drag and drop the type of evidence from the left onto the correct description(s) of that evidence on the right.
Select and Place:
Exam 210-255: Question 6 - Image 1
Answer

Suggested Answer

Exam 210-255: Question 6 - Image 2
Question 7 of 179

Which process is being utilized when IPS events are removed to improve data integrity?
Answer

Suggested Answer

The suggested answer is A.

Question 8 of 179

In Microsoft Windows, as files are deleted the space they were allocated eventually is considered available for use by other files. This creates alternating used and unused areas of various sizes. What is this called?
Answer

Suggested Answer

The suggested answer is B.

Question 9 of 179

Which two components are included in a 5-tuple? (Choose two.)
Answer

Suggested Answer

The suggested answer is A, B.

A 5-tuple refers to a set of five different values that comprise a Transmission Control Protocol/Internet Protocol (TCP/IP) connection. It includes a source IP address/port number, destination IP address/port number and the protocol in use.
Question 10 of 179

Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable component?
Answer

Suggested Answer

The suggested answer is B.

There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component.
Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.