Which of the following tools should be implemented to detect similar attacks?
A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....
Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all
DRAG DROP Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all. View AnswerAnswer:
To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online?
An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability. To prevent this type of breach in the future, which of the following security controls should be put in...
Which of the following controls would BEST mitigate the identified vulnerability?
A security architect is implementing security measures in response to an external audit that found vulnerabilities in the corporate collaboration tool suite. The report identified the lack of any mechanism to provide confidentiality for electronic correspondence between users and between users and group mailboxes. Which of the following controls would...
Which of the following tools is the security engineer using to produce the above output?
A security engineer must establish a method to assess compliance with company security policies as they apply to the unique configuration of individual endpoints, as well as to the shared configuration policies of common devices. Which of the following tools is the security engineer using to produce the above output?A...
Which of the following types of attack vectors did the penetration tester use?
An internal penetration tester was assessing a recruiting page for potential issues before it was pushed to the production website. The penetration tester discovers an issue that must be corrected before the page goes live. The web host administrator collects the log files below and gives them to the development...
Which of the following SDLC best practices should the development team have followed?
A software development team has spent the last 18 months developing a new web-based front-end that will allow clients to check the status of their orders as they proceed through manufacturing. The marketing team schedules a launch party to present the new application to the client base in two weeks....
Based on the data classification table above, which of the following BEST describes the overall classification?
An engineer is evaluating the control profile to assign to a system containing PII, financial, and proprietary data. Based on the data classification table above, which of the following BEST describes the overall classification?A . High confidentiality, high availabilityB . High confidentiality, medium availabilityC . Low availability, low confidentialityD ....
Which of the following tools should be implemented to detect similar attacks?
A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....
Which of the following would be the BEST methods to prepare this report?
The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...