Given this output, which of the following security issues has been discovered?

A company has forbidden the use of external media within its headquarters location. A security analyst is working on adding additional repositories to a server in the environment when the analyst notices some odd processes running on the system. The analyst runs a command and sees the following: Given this...

March 7, 2021 No Comments READ MORE +

Which of the following is the router experiencing?

A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output: Which of the following is the router experiencing?A . DDoS attackB...

March 7, 2021 No Comments READ MORE +

Which of the following is the BEST account management practice?

An organization prefers to apply account permissions to groups and not individual users, but allows for exceptions that are justified. Some systems require a machine-to-machine data exchange and an associated account to perform this data exchange. One particular system has data in a folder that must be modified by another...

March 6, 2021 No Comments READ MORE +

Which of the following should the systems administrator do NEXT after generating the CSR?

A systems administrator wants to enforce me use of HTTPS on a new website. Which of the following should the systems administrator do NEXT after generating the CSR?A . Install the certificate on the serverB . Provide the public key to the CAC . Password protect the public keyD ....

March 6, 2021 No Comments READ MORE +

Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?

Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?A . The document is a honeyfile and is meant to attract the attention of a cyberintruder.B . The document is a backup...

March 6, 2021 No Comments READ MORE +

Which of the following actions should be taken before deploying the new server?

A security team has completed the installation of a new server. The OS and applications have been patched and tested, and the server is ready to be deployed. Which of the following actions should be taken before deploying the new server?A . Disable the default accounts.B . Run a penetration...

March 6, 2021 No Comments READ MORE +

Which of the following has the administrator found?

An administrator performs a workstation audit and finds one that has non-standard software installed. The administrator then requests a report to see if a change request was completed for the installed software. The report shows a request was completed. Which of the following has the administrator found?A . A baseline...

March 6, 2021 No Comments READ MORE +

Which of the following BEST describes what is happening?

An organization’s policy requires users to create passwords with an uppercase letter, lowercase letter, number, and symbol. This policy is enforced with technical controls, which also prevents users from using any of their previous 12 passwords. The quantization does not use single sign-on, nor does it centralize storage of passwords....

March 6, 2021 No Comments READ MORE +

Which of the following would MOST likely be considered a benefit of this certification?

An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?A . It allows for the sharing of digital forensics data across organizations.B . It provides insurance in case of a data breach.C . It provides complimentary training and...

March 6, 2021 No Comments READ MORE +

Which of the following would BEST meet the confidentiality requirements of the data?

A company has users and porters in multiple geographic locations and the printers are locked in common areas of the offices. To preserve the confidentially of PII, a security administrator needs to implement the appropriate controls. Which of the following would BEST meet the confidentiality requirements of the data?A ....

March 6, 2021 No Comments READ MORE +