What are the two differences between stateful and deep packet inspection? (Choose two.)
Question 203
An engineer received a flood of phishing emails from HR with the source address HRjacobrn@company. com. What is the threat actor in this scenario?
Question 204
Syslog collecting software is installed on the server. For the log containment, a disk with FAT type partition is used. An engineer determined that log files are being corrupted when the 4 GB file size is exceeded. Which action resolves the issue?
Question 205
Which type of verification consists of using tools to compute the message digest of the original and copied data, then comparing the similarity of the digests?
Question 206
What are two denial-of-service (DoS) attacks? (Choose two.)
Question 207
What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?
Question 208
Refer to the exhibit. Which field contains DNS header information if the payload is a query or response?
Question 209
What is the difference between a threat and an exploit?
Question 210
Refer to the exhibit. A SOC engineer is analyzing the provided Cuckoo Sandbox report for a file that has been downloaded from an URL, received via email. What is the state of this file?