Given this concern, and the need to keep archived logs for log correction applications, what is the most appropriate next steps?
Beta corporation is doing a core evaluation of its centralized logging capabilities. The security staff suspects that the central server has several log files over the past few weeks that have had their contents changed. Given this concern, and the need to keep archived logs for log correction applications, what...
What type of Unified Modelling Language (UML) diagram is used to show dependencies between logical groupings in a system?
What type of Unified Modelling Language (UML) diagram is used to show dependencies between logical groupings in a system?A . Package diagramB . Deployment diagramC . Class diagramD . Use case diagramView AnswerAnswer: A
How can they best protect against injection attacks against their custom web application and database applications?
An organization is implementing a control within the Application Software Security CIS Control. How can they best protect against injection attacks against their custom web application and database applications?A . Ensure the web application server logs are going to a central log hostB . Filter input to only allow safe...
Which event should they receive an alert on?
As part of an effort to implement a control on E-mail and Web Protections, an organization is monitoring their webserver traffic. Which event should they receive an alert on?A . The number of website hits is higher that the daily averageB . The logfiles of the webserver are rotated and...
Which of the following actions produced the output seen below?
Which of the following actions produced the output seen below? A . An access rule was removed from firewallrules.txtB . An access rule was added to firewallrules2.txtC . An access rule was added to firewallrules.txtD . An access rule was removed from firewallrules2.txtView AnswerAnswer: B
What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?
What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?A . Control which devices can connect to the networkB . Passively identify new devicesC . Inventory offline databasesD . Actively identify new serversView AnswerAnswer: D
Given the audit finding below, which CIS Control was being measured?
Given the audit finding below, which CIS Control was being measured? A . Controlled Access Based on the Need to KnowB . Controlled Use of Administrative PrivilegeC . Limitation and Control of Network Ports, Protocols and ServicesD . Secure Configurations for Hardware and Software on Laptops, Workstations, and ServersE ....
Which actions would best protect the computers with the software package installed?
After installing a software package on several workstations, an administrator discovered the software opened network port TCP 23456 on each workstation. The port is part of a software management function that is not needed on corporate workstations. Which actions would best protect the computers with the software package installed?A ....
Which of the following should be used to test antivirus software?
Which of the following should be used to test antivirus software?A . FIPS 140-2B . Code RedC . HeartbleedD . EICARView AnswerAnswer: D
Which of the following lines in your firewall ruleset has expired and should be removed from the configuration?
Dragonfly Industries requires firewall rules to go through a change management system before they are configured. Review the change management log. Which of the following lines in your firewall ruleset has expired and should be removed from the configuration?A . access-list outbound permit tcp host 10.1.1.7 any eq smtpB ....