Which of the following techniques would BEST support this?

A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence. Which of the following techniques would BEST support this?A . Configuring systemd services to run automatically at startupB . Creating a backdoorC . Exploiting an arbitrary...

September 10, 2022 No Comments READ MORE +

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company’s Linux servers. While the software version is no longer supported by the OSS community, the company’s Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in the future.

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company’s Linux servers. While the software version is no longer supported by the OSS community, the company’s Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in...

September 10, 2022 No Comments READ MORE +

Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

Device event logs sources from MDM software as follows: Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?A . Malicious installation of an application; change the MDM configuration to remove application ID 1220.B . Resource leak; recover the...

September 10, 2022 No Comments READ MORE +

Which of the following would mitigate the department’s concerns?

All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be: Leaked to the...

September 10, 2022 No Comments READ MORE +

As part of the image process, which of the following is the FIRST step the analyst should take?

A large number of emails have been reported, and a security analyst is reviewing the following information from the emails: As part of the image process, which of the following is the FIRST step the analyst should take?A . Block the email address carl b@comptia1 com, as it is sending...

September 9, 2022 No Comments READ MORE +

Which of the following should be created to prevent this type of issue in the future?

Due to adverse events, a medium-sized corporation suffered a major operational disruption that caused its servers to crash and experience a major power outage . Which of the following should be created to prevent this type of issue in the future?A . SLAB . BIAC . BCMD . BCPE ....

September 9, 2022 No Comments READ MORE +

Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?

A security analyst is reviewing the following vulnerability assessment report: Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?A . Server1B . Server2C . Server 3D . ServersView AnswerAnswer: A

September 9, 2022 No Comments READ MORE +

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away. Which of...

September 9, 2022 No Comments READ MORE +

Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the Docker host due to a single application that is overconsuming available resources. Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?A...

September 8, 2022 No Comments READ MORE +

Which of the must occur to ensure the integrity of the image?

Immediately following the report of a potential breach, a security engineer creates a forensic image of the server in question as part of the organization incident response procedure . Which of the must occur to ensure the integrity of the image?A . The image must be password protected against changes.B...

September 8, 2022 No Comments READ MORE +