A pass-the-hash attack is commonly used to:
A pass-the-hash attack is commonly used to:A . modify DNS records to point to a different domains.B . modify the IP address of the targeted computer.C . execute java script to capture user credentials.D . laterally move across the network.View AnswerAnswer: D
Which of the following should be installed to resolve these issues?
After a systems administrator installed and configured Kerberos services, several users experienced authentication issues. Which of the following should be installed to resolve these issues?A . RADIUS serverB . NTLM serviceC . LDAP serviceD . NTP serverView AnswerAnswer: D
Which of the following does the organization need to determine for this to be successful?
An organization plans to transition the intrusion detection and prevention techniques on a critical subnet to an anomaly-based system. Which of the following does the organization need to determine for this to be successful?A . The baselineB . The endpoint configurationsC . The adversary behavior profilesD . The IPS signaturesView...
Which of the following command line tools would be BEST to identify the services running in a server?
Which of the following command line tools would be BEST to identify the services running in a server?A . TracerouteB . NslookupC . IpconfigD . NetstatView AnswerAnswer: D
Which of the following protocols does the technician MOST likely need to configure?
A customer calls a technician and needs to remotely connect to a web server to change some code manually. The technician needs to configure the user's machine with protocols to connect to the Unix web server, which is behind a firewall. Which of the following protocols does the technician MOST...
Which of the following MOST likely occurred?
After being alerted to potential anomalous activity related to trivial DNS lookups, a security analyst looks at the following output of implemented firewall rules: The analyst notices that the expected policy has no hit count for the day. Which of the following MOST likely occurred?A . Data execution prevention is...
Which of the following risk response techniques has the company chosen?
During a risk assessment, results show that a fire in one of the company's datacenters could cost up to $20 million in equipment damages and lost revenue. As a result, the company insures the datacenter for up to $20 million in damages for the cost of $30,000 a year. Which...
Which of the following types of threat actors does this BEST describe?
An analysis of a threat actor, which has been active for several years, reveals the threat actor has high levels of funding, motivation, and sophistication. Which of the following types of threat actors does this BEST describe?A . Advanced persistent threatB . HacktivistC . Organized crimeD . InsiderView AnswerAnswer: A
Which of the following technologies BEST meets this need?
Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this need?A . GeofencingB . ContainerizationC . Device encryptionD . SandboxingView AnswerAnswer: D
Which of the following is MOST likely the issue, and what should be done?
An organization has the following password policies: - Passwords must be at least 16 characters long. - Three tailed login attempts will lock the account (or live minutes. - Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol. A database server was recently breached, and the...