This type of attack is known as which of the following?

A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?A . PhishingB . Social engineeringC . Man-in-the-middleD . Shoulder surfingView...

July 14, 2021 No Comments READ MORE +

Which of the following software assessment capabilities is the lab performing AND during which phase of the SDLC should this occur?

A software assurance lab is performing a dynamic assessment on an application by automatically generating and inputting different, random data sets to attempt to cause an error/failure condition . Which of the following software assessment capabilities is the lab performing AND during which phase of the SDLC should this occur?...

July 14, 2021 No Comments READ MORE +

Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?

A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the company’s asset inventory is not current . Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?A . A manual log review from...

July 13, 2021 No Comments READ MORE +

Which of the following sources would be used to evaluate which network service was interrupted?

A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled and production is affected . Which of the following sources would be used to evaluate which network service was interrupted?A . SyslogB . Network mappingC ....

July 13, 2021 No Comments READ MORE +

Which of the following commands would a security analyst use to make a copy of an image for forensics use?

Which of the following commands would a security analyst use to make a copy of an image for forensics use?A . ddB . wgetC . touchD . rmView AnswerAnswer: A

July 13, 2021 No Comments READ MORE +

Which of the following should the company implement?

A company discovers an unauthorized device accessing network resources through one of many network drops in a common area used by visitors. The company decides that it wants to quickly prevent unauthorized devices from accessing the network but policy prevents the company from making changes on every connecting client. Which...

July 13, 2021 No Comments READ MORE +

Which of the following recommendations will BEST prevent the same attack from occurring in the future?

An organization has recently recovered from an incident where a managed switch had been accessed and reconfigured without authorization by an insider. The incident response team is working on developing a lessons learned report with recommendations . Which of the following recommendations will BEST prevent the same attack from occurring...

July 13, 2021 No Comments READ MORE +

A security analyst suspects that a workstation may be beaconing to a command and control server. Inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization

HOTSPOT A security analyst suspects that a workstation may be beaconing to a command and control server. Inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization....

July 12, 2021 No Comments READ MORE +

Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application on the same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)?

Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application on the same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)?A...

July 11, 2021 No Comments READ MORE +

Which of the following types of information should be considered based on information traditionally found in the SOW?

As part of an upcoming engagement for a client, an analyst is configuring a penetration testing application to ensure the scan complies with information defined in the SOW . Which of the following types of information should be considered based on information traditionally found in the SOW? (Select two.)A ....

July 11, 2021 No Comments READ MORE +