When attempting to do a stealth scan against a system that does not respond to ping, which of the following Nmap commands BEST accomplishes that goal?
When attempting to do a stealth scan against a system that does not respond to ping, which of the following Nmap commands BEST accomplishes that goal?A . nmap CsA CO <system> -noping B. nmap CsT CO <system> -P0 C. nmap CsS CO <system> -P0 D. nmap CsQ CO <system> -P0View...
Which of the following changes should the security analyst make to BEST protect the environment?
A security analyst has discovered trial developers have installed browsers on all development servers in the company's cloud infrastructure and are using them to browse the Internet. Which of the following changes should the security analyst make to BEST protect the environment?A . Create a security rule that blocks Internet...
Which of the following describes the type of vulnerability that was MOST likely expiated?
A security analyst is investigating a system compromise. The analyst verities the system was up to date on OS patches at the time of the compromise. Which of the following describes the type of vulnerability that was MOST likely expiated?A . Insider threat B. Buffer overflow C. Advanced persistent threat...
Which of the following BEST describes the method used by each tool?
A security analyst is evaluating two vulnerability management tools for possible use in an organization. The analyst set up each of the tools according to the respective vendor's instructions and generated a report of vulnerabilities that ran against the same target server. Tool A reported the following: Tool B reported...
Which of the following is the MOST important objective of a post-incident review?
Which of the following is the MOST important objective of a post-incident review?A . Capture lessons learned and improve incident response processes B. Develop a process for containment and continue improvement efforts C. Identify new technologies and strategies to remediate D. Identify a new management strategyView AnswerAnswer: A
Which of the following lines indicates the computer may be compromised?
A user's computer has been running slowly when the user tries to access web pages. A security analyst runs the command netstat -aon from the command line and receives the following output: Which of the following lines indicates the computer may be compromised?A . Line 1 B. Line 2 C....
Which of the following should be the focus of the investigation?
An organization was alerted to a possible compromise after its proprietary data was found for sale on the Internet. An analyst is reviewing the logs from the next-generation UTM in an attempt to find evidence of this breach. Given the following output: Which of the following should be the focus...
Which of the following commands should the analyst investigate FIRST?
During a routine log review, a security analyst has found the following commands that cannot be identified from the Bash history log on the root user. Which of the following commands should the analyst investigate FIRST?A . Line 1 B. Line 2 C. Line 3 D. Line 4 E. Line...
Which of the following should the analyst provide an assessment of?
An analyst has been asked to provide feedback regarding the control required by a revised regulatory framework At this time, the analyst only needs to focus on the technical controls. Which of the following should the analyst provide an assessment of?A . Tokenization of sensitive data B. Establishment o' data...
Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?
Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?A . Data custodian B. Data owner C. Data processor D. Senior managementView AnswerAnswer: B Explanation: Reference: https://www.pearsonitcertification.com/articles/article.aspx?p=2731933&seqNum=3