A security analyst is reviewing IDS logs and notices the following entry:

A security analyst is reviewing IDS logs and notices the following entry: A . Cross-site scriptingB . Header manipulationC . SQL injectionD . XML injectionView AnswerAnswer: C

March 19, 2018 No Comments READ MORE +

Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

A security analyst received a compromised workstation. The workstation’s hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?A . Make a copy of the hard drive.B ....

March 16, 2018 No Comments READ MORE +

Which of the following is the MOST secure solution to remediate this vulnerability?

A cybersecurity professional typed in a URL and discovered the admin panel for the e-commerce application is accessible over the open web with the default password. Which of the following is the MOST secure solution to remediate this vulnerability?A . Rename the URL to a more obscure name, whitelist all...

March 15, 2018 No Comments READ MORE +

Which of the following vulnerability options would BEST create the process requirements?

A security analyst is creating baseline system images to remediate vulnerabilities found in different operating systems. Each image needs to be scanned before it is deployed. The security analyst must ensure the configurations match industry standard benchmarks and the process can be repeated frequently. Which of the following vulnerability options...

March 3, 2018 No Comments READ MORE +

Which of the following should the analyst use?

An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port. Which of the following should the analyst use?A . WiresharkB . QualysC . netstatD . nmapE . pingView AnswerAnswer:...

February 27, 2018 No Comments READ MORE +

Which of the following BEST describes the offensive participants in a tabletop exercise?

Which of the following BEST describes the offensive participants in a tabletop exercise?A . Red teamB . Blue teamC . System administratorsD . Security analystsE . Operations teamView AnswerAnswer: A

February 19, 2018 No Comments READ MORE +

Which of the following compensating controls would help prevent this from reoccurring?

A system administrator who was using an account with elevated privileges deleted a large amount of log files generated by a virtual hypervisor in order to free up disk space. These log files are needed by the security team to analyze the health of the virtual machines. Which of the...

February 18, 2018 No Comments READ MORE +

Once the analyst has located a patch for the vulnerability, which of the following should happen NEXT?

A security analyst has been asked to remediate a server vulnerability. Once the analyst has located a patch for the vulnerability, which of the following should happen NEXT?A . Start the change control process.B . Rescan to ensure the vulnerability still exists.C . Implement continuous monitoring.D . Begin the incident...

February 12, 2018 No Comments READ MORE +

Which of the following describes what this code has done on the network?

A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types ‘history’ into the prompt, and sees this line of code in the latest bash history: This concerns the analyst because this subnet should not be known to users within the company. Which...

February 9, 2018 No Comments READ MORE +

Given the above information, which of the following steps should be performed NEXT to secure the system?

A security analyst is reviewing the following log after enabling key-based authentication. Given the above information, which of the following steps should be performed NEXT to secure the system?A . Disable anonymous SSH logins.B . Disable password authentication for SSD . Disable SSHv1.E . Disable remote root SSH logins.View AnswerAnswer:...

February 3, 2018 No Comments READ MORE +