Which of the following commands would MOST likely provide the needed information?

An information security analyst is compiling data from a recent penetration test and reviews the following output: The analyst wants to obtain more information about the web-based services that are running on the target. Which of the following commands would MOST likely provide the needed information?A . ping -t 10.79.95.173.rdns.datacenters.comB...

November 22, 2020 No Comments READ MORE +

It is important to parameterize queries to prevent:

It is important to parameterize queries to prevent:A . the execution of unauthorized actions against a database.B . a memory overflow that executes code with elevated privileges.C . the establishment of a web shell that would allow unauthorized access.D . the queries from using an outdated library with security vulnerabilities.View...

November 22, 2020 No Comments READ MORE +

Which of the following should be considered FIRST prior to disposing of the electronic data?

An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?A . Sanitization policyB . Data sovereigntyC . Encryption policyD . Retention standardsView AnswerAnswer: D

November 22, 2020 No Comments READ MORE +

While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security.

While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security. To provide the MOST secure access model in this scenario, the jumpbox should be.A . placed in an isolated network segment, authenticated on the IT...

November 21, 2020 No Comments READ MORE +

Which of the following would explain the difference in results?

A security analyst is trying to determine if a host is active on a network. The analyst first attempts the following: The analyst runs the following command next: Which of the following would explain the difference in results?A . ICMP is being blocked by a firewall.B . The routing tables...

November 19, 2020 No Comments READ MORE +

Which of the following actions should the technician take to accomplish this task?

A security technician is testing a solution that will prevent outside entities from spoofing the company's email domain, which is comptia.org. The testing is successful, and the security technician is prepared to fully implement the solution. Which of the following actions should the technician take to accomplish this task?A ....

November 18, 2020 No Comments READ MORE +

Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?

A security analyst has received reports of very slow, intermittent access to a public-facing corporate server. Suspecting the system may be compromised, the analyst runs the following commands: Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?A ....

November 18, 2020 No Comments READ MORE +

Which of the following should be done to correct the cause of the vulnerability?

A development team uses open-source software and follows an Agile methodology with two-week sprints. Last month, the security team filed a bug for an insecure version of a common library. The DevOps team updated the library on the server, and then the security team rescanned the server to verify it...

November 18, 2020 No Comments READ MORE +

Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?

Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?A . Human resourcesB . Public relationsC . MarketingD . Internal network operations centerView AnswerAnswer: B

July 24, 2020 No Comments READ MORE +

It is important to parameterize queries to prevent __________.

It is important to parameterize queries to prevent __________.A . the execution of unauthorized actions against a database.B . a memory overflow that executes code with elevated privileges.C . the establishment of a web shell that would allow unauthorized access.D . the queries from using an outdated library with security...

July 23, 2020 No Comments READ MORE +