Which of the following attacks MOST likely occurred?
A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company's network. The company's lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst...
Which of the following attacks is MOST likely being detected?
A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of...
Which of the following should the technician do to maintain chain of custody?
An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?A . Document the collection and require a sign-off when possession changes.B . Lock the device in a safe or other secure location to prevent theft or...
Which of the following BEST describes the type of testing the user should perform?
A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?A . Code signingB . FuzzingC . Manual code reviewD . Dynamic code analysisView AnswerAnswer: D
Which of the following BEST describes the configurations the attacker exploited?
An attacker was easily able to log in to a company's security camera by performing a basic online search for a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?A . Weak encryptionB . Unsecure protocolsC . Default settingsD...
A security engineer is setting up passwordless authentication for the first time
DRAG DROP A security engineer is setting up passwordless authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the simulation,...
Which of the following would be BEST to mitigate CEO’s concern?
The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from...
Which of the following should the administrator use?
A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?A . SDPB . AAAC . IaaSD . MSSPE . MicroservicesView AnswerAnswer:...
Which of the following will the analyst MOST likely consult to validate which platforms have been affected?
A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST likely consult to validate which platforms have been affected?A . OSINTB . SIEMC . CVSSD . CVEView AnswerAnswer: D
Which of the following are the BEST options to accomplish this objective'?
An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the BEST options to accomplish this objective'? (Select...