Which of the following technologies meet the compatibility requirement?
An analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions . Which of the following technologies meet the compatibility requirement? (Select three.)A . 3DESB . AESC . IDEAD . PKCSE . PGPF . SSL/TLSG . TEMPESTView AnswerAnswer: B,D,F
Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine. Which of the following describes the type of...
Which of the following describes what the analyst should do NEXT?
A security analyst has created an image of a drive from an incident . Which of the following describes what the analyst should do NEXT?A . The analyst should create a backup of the drive and then hash the drive.B . The analyst should begin analyzing the image and begin...
Which of the following courses of action would ONLY identify the known vulnerability?
An alert has been distributed throughout the information security community regarding a critical Apache vulnerability . Which of the following courses of action would ONLY identify the known vulnerability?A . Perform an unauthenticated vulnerability scan on all servers in the environment.B . Perform a scan for the specific vulnerability on...
Which of the following is the MOST likely explanation for this?
A system administrator recently deployed and verified the installation of a critical patch issued by the company’s primary OS vendor. This patch was supposed to remedy a vulnerability that would allow an adversary to remotely execute code from over the network. However, the administrator just ran a vulnerability assessment of...
Which of the following should be done FIRST to prevent data on the company NAS from being encrypted by infected devices?
The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files: Locky.js xerty.ini xerty.lib Further analysis indicates that when...
Which of the following should the analyst implement?
A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that the attacker successfully authenticated from an unauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromised passwords . Which of the following...
Which of the following attacks may be occurring?
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered for the username: 0xbfff601a . Which of the following attacks may be occurring?A . Buffer overflow attackB . Man-in-the-middle attackC . Smurf attackD . Format string attackE . Denial of service attackView...
When network administrators observe an increased amount of web traffic without an increased number of financial transactions, the company is MOST likely experiencing which of the following attacks?
When network administrators observe an increased amount of web traffic without an increased number of financial transactions, the company is MOST likely experiencing which of the following attacks?A . BluejackingB . ARP cache poisoningC . PhishingD . DoSView AnswerAnswer: D
After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed.
After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed. This is an example...