A security administrator begins assessing a network with software that checks for available exploits against a known database using both credentials and external scripts A report will be compiled and used to confirm patching levels.
A security administrator begins assessing a network with software that checks for available exploits against a known database using both credentials and external scripts A report will be compiled and used to confirm patching levels. This is an example ofA . penetration testingB . fuzzingC . static code analysisD ....
Which of the following types of authentication would be BEST suited for this scenario?
Topic 1, Exam Pool A A restaurant wants to deploy tablets to all waitstaff but does not want to use passwords or manage users to connect the tablets to the network. Which of the following types of authentication would be BEST suited for this scenario?A . Proximity cardsB . IEEE...
Which of the following is the BEST method to prevent data compromise?
An organization handling highly confidential information needs to update its systems. Which of the following is the BEST method to prevent data compromise?A . WipingB . DegaussingC . ShreddingD . PurgingView AnswerAnswer: C
Which of the following command line tools should the analyst use to perform the Initial assessment?
A security analyst is asked to check the configuration of the company's DNS service on the server. Which of the following command line tools should the analyst use to perform the Initial assessment?A . nslookup/dlgB . tracedC . ipconfig/ifconfigD . tcpdumpView AnswerAnswer: B
Which of the following should the technician implement?
A technician wants to add wireless guest capabilities to an enterprise wireless network that is currently implementing 802.1X EAP-TLS. The guest network must • Support client Isolation. • Issue a unique encryption key to each client. • Allow guests to register using their personal email addresses Which of the following...
Which of the following caused the incident?
The Chief Executive Officer (CEO) received an email from the Chief Financial Officer (CFO), asking the CEO to send financial details. The CEO thought it was strange that the CFO would ask for the financial details via email. The email address was correct in the "From “section of the email....
Which of the following types of vulnerability scans typically returns more detailed and thorough insights into actual system vulnerabilities?
Which of the following types of vulnerability scans typically returns more detailed and thorough insights into actual system vulnerabilities?A . Non-credentialedB . IntrusiveC . CredentialedD . Non-IntrusiveView AnswerAnswer: B
Which of the following is the BEST explanation for these alerts?
A security analyst received an after-hours alert indicating that a large number of accounts with the suffix “admin’’ were locked out. The accounts were all locked out after five unsuccessful login attempts, and no other accounts on the network triggered the same alert. Which of the following is the BEST...
In the event of a security incident, which of the following should be captured FIRST?
In the event of a security incident, which of the following should be captured FIRST?A . An external hard driveB . System memoryC . An internal hard driveD . Network interface dataView AnswerAnswer: B
Which of the following BEST describes the scanned environment?
Given the following output: Which of the following BEST describes the scanned environment?A . A host was identified as a web server that is hosting multiple domains.B . A host was scanned, and web-based vulnerabilities were found.C . A connection was established to a domain, and several redirect connections were...