Tagged: 210-255 Dumps PDF
Refer to the Exhibit.
A customer reports that they cannot access your organization’s website. Which option is a possible reason that
the customer cannot access the website?
A. The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.
B. The server at 10.67.10.5 has a virus.
C. A vulnerability scanner has shown that 10.67.10.5 has been compromised.
D. Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.
Every firewall has its own database where it maintains the website reputation on terms of security, ease of
access, performance etc and below certain score (generally 7 in case of Cisco), firewalls block access to the
sites. For example, you can visit www.senderbase.org and enter name of any website and you will see the
reputation of that website.
In Microsoft Windows, as files are deleted the space they were allocated eventually is considered available for
use by other files. This creates alternating used and unused areas of various sizes. What is this called?
A. network file storing
B. free space fragmentation
C. alternate data streaming
Free (unallocated) space fragmentation occurs when there are several unused areas of the file system
where new files or meta data can be written to. Unwanted free space fragmentation is generally caused
by deletion or truncation of files, but file systems may also intentionally insert fragments (“bubbles”) of
free space in order to facilitate extending nearby files
During which phase of the forensic process is data that is related to a specific event labeled and recorded to
preserve its integrity?