Which of the following would MOST likely appear in an uncredentialed vulnerability scan?
Which of the following would MOST likely appear in an uncredentialed vulnerability scan?A . Self-signed certificatesB . Missing patchesC . Auditing parametersD . Inactive local accountsView AnswerAnswer: D
Which of the following types of attacks are MOST likely occurring?
A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access. Which of the...
Which of the following vulnerabilities would occur if this is executed?
Refer to the following code: Which of the following vulnerabilities would occur if this is executed?A . Page exceptionB . Pointer deferenceC . NullPointerExceptionD . Missing null checkView AnswerAnswer: D
Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?
Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?A . ShibbolethB . RADIUS federationC . SAMLD ....
Which of the following represents the actions the penetration tester is performing?
A penetration tester is crawling a target website that is available to the public. Which of the following represents the actions the penetration tester is performing?A . URL hijackingB . ReconnaissanceC . White box testingD . Escalation of privilegeView AnswerAnswer: B
Which of the following should the administrator implement?
A system administrator wants to provide for and enforce wireless access accountability during events where external speakers are invited to make presentations to a mixed audience of employees and non-employees. Which of the following should the administrator implement?A . Shared accountsB . Preshared passwordsC . Least privilegeD . Sponsored guestView...
Which of the following types of cloud infrastructures would allow several organizations with similar structures and interests to realize the benefits of shared storage and resources?
Which of the following types of cloud infrastructures would allow several organizations with similar structures and interests to realize the benefits of shared storage and resources?A . PrivateB . HybridC . PublicD . CommunityView AnswerAnswer: D
Based on the above information, which of the following types of malware was installed on the server?
An information security specialist is reviewing the following output from a Linux server. Based on the above information, which of the following types of malware was installed on the server?A . Logic bombB . TrojanC . BackdoorD . RansomwareE . RootkitView AnswerAnswer: A
Which of the following network-based security controls should the engineer consider implementing?
Malicious traffic from an internal network has been detected on an unauthorized port on an application server. Which of the following network-based security controls should the engineer consider implementing?A . ACLsB . HIPSC . NATD . MAC filteringView AnswerAnswer: A
Which of the following should the security analyst recommend is lieu of an OCSP?
An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the security analyst recommend is lieu of an OCSP?A . CSRB . CRLC . CAD . OIDView AnswerAnswer: B