Which of the following tools should the analyst use to further review the pcap?
An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfer the pcap back to the machine for analysis. Which of the following tools should the analyst use to further review the pcap?A . NmapB...
Which of the following attacks has occurred?
A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet, while reviewing logs and tool output, the analyst sees the following: Which of the following attacks has occurred?A . IP conflictB . Pass-the-hashC . MAC floodingD . Directory traversalE...
Which of the following will the forensics investigator MOST likely determine has occurred?
A forensics investigator is examining a number of unauthorized payments the were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing...
Which of the following should the administrator implement?
A security administrator currently spends a large amount of time on common security tasks, such aa report generation, phishing investigations, and user provisioning and deprovisioning This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members. Which of...
Which of the following relets to applications and systems that are used within an organization without consent or approval?
Which of the following relets to applications and systems that are used within an organization without consent or approval?A . Shadow ITB . OSINTC . Dark webD . Insider threatsView AnswerAnswer: A
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...
Which of the following would MOST likely contain that information?
An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?A . NGFWB . PagefileC . NetFlowD . RAMView AnswerAnswer: C
Which of the following would BEST assist the company?
A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B
Which of the following tools will the administrator MOST likely use to confirm the suspicions?
A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions?A . NmapB . WiresharkC . AutopsyD . DNSEnumView AnswerAnswer: A
Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).
Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).A . OffboardingB . Mandatory vacationC . Job rotationD . Background checksE . Separation of dutiesF . Acceptable useView AnswerAnswer: B,C