A pass-the-hash attack is commonly used to:

A pass-the-hash attack is commonly used to:A . modify DNS records to point to a different domains.B . modify the IP address of the targeted computer.C . execute java script to capture user credentials.D . laterally move across the network.View AnswerAnswer: D

March 8, 2021 No Comments READ MORE +

Which of the following should be installed to resolve these issues?

After a systems administrator installed and configured Kerberos services, several users experienced authentication issues. Which of the following should be installed to resolve these issues?A . RADIUS serverB . NTLM serviceC . LDAP serviceD . NTP serverView AnswerAnswer: D

March 8, 2021 No Comments READ MORE +

Which of the following does the organization need to determine for this to be successful?

An organization plans to transition the intrusion detection and prevention techniques on a critical subnet to an anomaly-based system. Which of the following does the organization need to determine for this to be successful?A . The baselineB . The endpoint configurationsC . The adversary behavior profilesD . The IPS signaturesView...

March 7, 2021 No Comments READ MORE +

Which of the following command line tools would be BEST to identify the services running in a server?

Which of the following command line tools would be BEST to identify the services running in a server?A . TracerouteB . NslookupC . IpconfigD . NetstatView AnswerAnswer: D

March 7, 2021 No Comments READ MORE +

Which of the following protocols does the technician MOST likely need to configure?

A customer calls a technician and needs to remotely connect to a web server to change some code manually. The technician needs to configure the user's machine with protocols to connect to the Unix web server, which is behind a firewall. Which of the following protocols does the technician MOST...

March 7, 2021 No Comments READ MORE +

Which of the following MOST likely occurred?

After being alerted to potential anomalous activity related to trivial DNS lookups, a security analyst looks at the following output of implemented firewall rules: The analyst notices that the expected policy has no hit count for the day. Which of the following MOST likely occurred?A . Data execution prevention is...

March 7, 2021 No Comments READ MORE +

Which of the following risk response techniques has the company chosen?

During a risk assessment, results show that a fire in one of the company's datacenters could cost up to $20 million in equipment damages and lost revenue. As a result, the company insures the datacenter for up to $20 million in damages for the cost of $30,000 a year. Which...

March 7, 2021 No Comments READ MORE +

Which of the following types of threat actors does this BEST describe?

An analysis of a threat actor, which has been active for several years, reveals the threat actor has high levels of funding, motivation, and sophistication. Which of the following types of threat actors does this BEST describe?A . Advanced persistent threatB . HacktivistC . Organized crimeD . InsiderView AnswerAnswer: A

March 7, 2021 No Comments READ MORE +

Which of the following technologies BEST meets this need?

Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this need?A . GeofencingB . ContainerizationC . Device encryptionD . SandboxingView AnswerAnswer: D

March 7, 2021 No Comments READ MORE +

Which of the following is MOST likely the issue, and what should be done?

An organization has the following password policies: - Passwords must be at least 16 characters long. - Three tailed login attempts will lock the account (or live minutes. - Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol. A database server was recently breached, and the...

March 7, 2021 No Comments READ MORE +