Which two components reduce the attack surface on an endpoint? (Choose two.)
Question 82
What is an attack surface as compared to a vulnerability?
Question 83
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Question 84
A. privilege escalation
Question 85
Refer to the exhibit. What does the output indicate about the server with the IP address 172.18.104.139?
Question 86
How does certificate authority impact a security system?
Question 87
An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications Which technology should be used to accomplish the task?
Question 88
What is indicated by an increase in IPv4 traffic carrying protocol 41?
Question 89
When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?
Question 90
Which attack represents the evasion technique of resource exhaustion?