Question 19

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

Correct Answer:D

Question 20

What is a threat in the context of cybersecurity

Correct Answer:D

Question 21

A/hich layer of the OSI Layer model is the target of a buffer overflow attack

Correct Answer:A

Question 22

What is an incident in the context of cybersecurity

Correct Answer:D

Question 23

Which is not the function of IPS

Correct Answer:A

Question 24

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time.

Correct Answer:D

START CC EXAM