Question 13

According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?
NOTE: It is mandatory to answer the question before proceeding to the next one.

Correct Answer:A

Question 14

Which of the following command is used to enable logging in iptables?

Correct Answer:B

Question 15

Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

Correct Answer:C

Question 16

Which of the following Windows features is used to enable Security Auditing in Windows?

Correct Answer:C

Question 17

Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?

Correct Answer:A

Question 18

Which of the following Windows Event Id will help you monitors file sharing across the network?

Correct Answer:C

START 312-39 EXAM