Which of the following does the log sample indicate?

A security administrator was informed that a server unexpectedly rebooted. The administrator received an export of syslog entries for analysis: Which of the following does the log sample indicate? (Choose two.)A . A root user performed an injection attack via kernel moduleB . Encrypted payroll data was successfully decrypted by...

January 29, 2020 No Comments READ MORE +

Which of the following combinations of techniques would the engineer MOST likely use in this testing?

An advanced threat emulation engineer is conducting testing against a client’s network. The engineer conducts the testing in as realistic a manner as possible. Consequently, the engineer has been gradually ramping up the volume of attacks over a long period of time. Which of the following combinations of techniques would...

January 28, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

January 28, 2020 No Comments READ MORE +

A security consultant is considering authentication options for a financial institution. The following authentication options are available

DRAG DROP A security consultant is considering authentication options for a financial institution. The following authentication options are available. Drag and drop the security mechanism to the appropriate use case. Options may be used once. View AnswerAnswer:

January 27, 2020 No Comments READ MORE +

Which of the following tools was used to gather this information from the hashed values in the file?

An information security officer is responsible for one secure network and one office network. Recent intelligence suggests there is an opportunity for attackers to gain access to the secure network due to similar login credentials across networks. To determine the users who should change their information, the information security officer...

January 27, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

January 27, 2020 No Comments READ MORE +

Which of the following would be the BEST technique for the security engineer to employ in an attempt to prevent reconnaissance activity?

A company monitors the performance of all web servers using WMI. A network administrator informs the security engineer that web servers hosting the company’s client-facing portal are running slowly today. After some investigation, the security engineer notices a large number of attempts at enumerating host information via SNMP from multiple...

January 26, 2020 No Comments READ MORE +

Which of the following design objectives should the engineer complete to BEST mitigate the company’s concerns?

An engineer is assisting with the design of a new virtualized environment that will house critical company services and reduce the datacenter’s physical footprint. The company has expressed concern about the integrity of operating systems and wants to ensure a vulnerability exploited in one datacenter segment would not lead to...

January 26, 2020 No Comments READ MORE +

Which of the following would have allowed the security team to use historical information to protect against the second attack?

Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks. Which of the following would have allowed the security team to use historical information...

January 26, 2020 No Comments READ MORE +

Which of the following would provide greater insight on the potential impact of this attempted attack?

Ann, a member of the finance department at a large corporation, has submitted a suspicious email she received to the information security team. The team was not expecting an email from Ann, and it contains a PDF file inside a ZIP compressed archive. The information security learn is not sure...

January 26, 2020 No Comments READ MORE +