Which of the following controls is most likely causing this issue and should be checked FIRST?
An administrator is experiencing issues when trying to upload a support file to a vendor A pop-up message reveals that a payment card number was found in the file, and the file upload was Mocked. Which of the following controls is most likely causing this issue and should be checked...
During a recent penetration test, the tester discovers large amounts of data were exfiltrated over the course of 12 months via the internet. The penetration tester stops the test to inform the client of the findings.
During a recent penetration test, the tester discovers large amounts of data were exfiltrated over the course of 12 months via the internet. The penetration tester stops the test to inform the client of the findings. Which of the following should be the client's NEXT step to mitigate the issue''A...
Which of the following technologies meets the requirement?
A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?A . SSO B. IDS C. MFA D. TPMView AnswerAnswer: C
Which of the following attacks took place?
An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding the credit card statement with unusual purchases. Which of the following attacks took place?A . On-path attack B....
Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?
Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?A . Check to see if the third party has resources to create dedicated development and staging environments. B. Verify the number of companies that downloaded the third-party code and the...
Which of the following is MOST likely occurring?
A security analyst is investigating suspicious traffic on the web server located at IP address 10.10.1.1. A search of the WAF logs reveals the following output: Which of the following is MOST likely occurring?A . XSS attack B. SQLi attack C. Replay attack D. XSRF attackView AnswerAnswer: B
After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:
After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:A . privilege escalation B. footprinting C. persistence D. pivoting.View AnswerAnswer: A
Which of the following is the security analyst MOST likely implementing?
A security analyst is working on a project to implement a solution that monitors network communications and provides alerts when abnormal behavior is detected. Which of the following is the security analyst MOST likely implementing?A . Vulnerability scans B. User behavior analysis C. Security orchestration, automation, and response D. Threat...
Which of the following is the BEST mitigation strategy to prevent this from happening in the future?
A company recently experienced a significant data loss when proprietary Information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded...
Which of the following would BEST meet the requirements?
A security analyst is designing the apocopate controls to limit unauthorized access to a physical site. The analyst has a directive to utilize the lowest possible budget. Which of the following would BEST meet the requirements?A . Preventive controls B. Compensating controls C. Deterrent controls D. Detective controlsView AnswerAnswer: C...