When trying to log onto a company’s new ticketing system, some employees receive the following message: Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error message?

When trying to log onto a company’s new ticketing system, some employees receive the following message: Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error message?A . Network resources...

Continue reading

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Select two.)

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Select two.)A . Rainbow table attacks greatly reduce compute cycles at attack time.B . Rainbow tables must include precomputed hashes.C . Rainbow table attacks do not require access to hashed passwords.D . Rainbow table attacks must be performed on...

Continue reading

Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?

Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions: Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the...

Continue reading

A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select two.)

A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select two.) A. Generate an X.509-compliant certificate that is signed by a...

Continue reading