Question 131
            
                    
                    Refer to the exhibit. Which technology generates this log?
                        
                        
                        
                        
                        
                        
                            
                                A. NetFlow 
                            
                            
                        
                        
                        
                            
                                B. IDS 
                            
                            
                        
                        
                        
                            
                                C. web proxy 
                            
                            
                        
                        
                        
                            
                                D. firewall 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 132
            
                    
                    
Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. src=10.11.0.0/16 and dst=10.11.0.0/16 
                            
                            
                        
                        
                        
                            
                                B. ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16 
                            
                            
                        
                        
                        
                            
                                C. ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16 
                            
                            
                        
                        
                        
                            
                                D. src==10.11.0.0/16 and dst==10.11.0.0/16 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 133
            
                    
                    
Which tool provides a full packet capture from network traffic?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Nagios 
                            
                            
                        
                        
                        
                            
                                B. CAINE 
                            
                            
                        
                        
                        
                            
                                C. Hydra 
                            
                            
                        
                        
                        
                            
                                D. Wireshark 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 134
            
                    
                    
A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. total throughput on the interface of the router and NetFlow records 
                            
                            
                        
                        
                        
                            
                                B. output of routing protocol authentication failures and ports used 
                            
                            
                        
                        
                        
                            
                                C. running processes on the applications and their total network usage 
                            
                            
                        
                        
                        
                            
                                D. deep packet captures of each application flow and duration 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 135
            
                    
                    Refer to the exhibit. What is depicted in the exhibit?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Windows Event logs 
                            
                            
                        
                        
                        
                            
                                B. Apache logs 
                            
                            
                        
                        
                        
                            
                                C. IIS logs 
                            
                            
                        
                        
                        
                            
                                D. UNIX-based syslog 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
	
     
     
            
            Question 136
            
                    
                    
Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. AWS 
                            
                            
                        
                        
                        
                            
                                B. IIS 
                            
                            
                        
                        
                        
                            
                                C. Load balancer  
                            
                            
                        
                        
                        
                            
                                D. Proxy server 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 137
            
                    
                    
Which regular expression matches "color" and "colour"?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. colo?ur 
                            
                            
                        
                        
                        
                            
                                B. col[08]+our 
                            
                            
                        
                        
                        
                            
                                C. colou?r 
                            
                            
                        
                        
                        
                            
                                D. col[09]+our 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 138
            
                    
                    
Which artifact is used to uniquely identify a detected file?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. file timestamp 
                            
                            
                        
                        
                        
                            
                                B. file extension 
                            
                            
                        
                        
                        
                            
                                C. file size 
                            
                            
                        
                        
                        
                            
                                D. file hash 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 139
            
                    
                    
A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.
Which technology should be used to accomplish this task?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. application whitelisting/blacklisting 
                            
                            
                        
                        
                        
                            
                                B. network NGFW 
                            
                            
                        
                        
                        
                            
                                C. host-based IDS 
                            
                            
                        
                        
                        
                            
                                D. antivirus/antispyware software 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 140
            
                    
                    
Which utility blocks a host portscan?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. HIDS 
                            
                            
                        
                        
                        
                            
                                B. sandboxing 
                            
                            
                        
                        
                        
                            
                                C. host-based firewall 
                            
                            
                        
                        
                        
                            
                                D. antimalware