Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?A . Memory leakB . SQL injectionC . Resource exhaustionD . Buffer overowView AnswerAnswer: D
Which of the following approaches would BEST meet the organization's goals?
A system uses an application server and database server Employing the principle of least privilege, only database administrators are given administrative privileges on the database server, and only application team members are given administrative privileges on the application server. Audit and log file reviews are performed by the business unit...
Which of the following would offer the BEST protection against offline brute force attacks?
A security administrator is choosing an algorithm to generate password hashes. Which of the following would offer the BEST protection against offline brute force attacks?A . MD5B . 3DESC . AESD . SHA-1View AnswerAnswer: D
During certain vulnerability scanning scenarios, It is possible for the target system to react in unexpected ways.
During certain vulnerability scanning scenarios, It is possible for the target system to react in unexpected ways. This type of scenario is MOST commonly known as:A . intrusive testing.B . a butter overflow.C . a race conditionD . active reconnaissance.View AnswerAnswer: D
Which of the following is the MOST likely reason for the issue?
A user from the financial aid office is having trouble interacting with the finaid directory on the university’s ERP system. The systems administrator who took the call ran a command and received the following output: Subsequently, the systems administrator has also confirmed the user is a member of the finaid...
A public relations team will be taking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all desks are cleared. The company is MOST likely trying to protect against.
A public relations team will be taking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all desks are cleared. The company is MOST...
Which of the following should be configured on the VPN concentrator?
A systems administrator needs to configure an SSL remote access VPN according to the following organizational guidelines: • The VPN must support encryption of header and payload. • The VPN must route all traffic through the company's gateway. Which of the following should be configured on the VPN concentrator?A ....
Which of the following should the technician implement?
A technician is required to configure updates on a guest operating system while maintaining the ability to quickly revert the changes that were made while testing the updates. Which of the following should the technician implement?A . SnapshotsB . Revert to known stateC . Rollback to known configurationD . Shadow...
Which of the following BEST describes what the technician is trying to correct with the new configuration?
A technician is configuring an intrusion prevention system to improve its ability to find and stop threats In the past, the system did not detect and stop some threats. Which of the following BEST describes what the technician is trying to correct with the new configuration?A . False positivesB ....
Given the file contents and the system’s issues, which of the following types of malware is present?
A company is experiencing an increasing number of systems that are locking up on Windows startup. The security analyst clones a machine, enters into safe mode, and discovers a file in the startup process that runs Wstart.bat. @echo off :asdhbawdhbasdhbawdhb start notepad.exe start notepad.exe start calculator.exe start calculator.exe goto asdhbawdhbasdhbawdhb...