- (Exam Topic 9)
What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?
Correct Answer:D
- (Exam Topic 12)
A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?
Correct Answer:D
- (Exam Topic 6)
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?
Correct Answer:A
- (Exam Topic 9)
Which of the following is a network intrusion detection technique?
Correct Answer:A
- (Exam Topic 13)
Access to which of the following is required to validate web session management?
Correct Answer:C
- (Exam Topic 9)
The overall goal of a penetration test is to determine a system's
Correct Answer:A