Which of the following attacks is occurring?
A security analyst is reviewing IDS logs and notices the following entry: Which of the following attacks is occurring?A . Cross-site scriptingB . Header manipulationC . SQL injectionD . XML injectionView AnswerAnswer: C
Which of the following is the BEST course of action based on the above warning and code snippet?
After scanning the main company’s website with the OWASP ZAP tool, a cybersecurity analyst is reviewing the following warning: The analyst reviews a snippet of the offending code: Which of the following is the BEST course of action based on the above warning and code snippet?A . The analyst should...
Which of the following combinations suggests how the threat should MOST likely be classified and the type of analysis that would be MOST helpful in protecting against this activity?
A threat intelligence analyst who works for a technology firm received this report from a vendor. “There has been an intellectual property theft campaign executed against organizations in the technology industry. Indicators for this activity are unique to each intrusion. The information that appears to be targeted is R&D data....
Which of the following is the BEST logical control to address the failure?
An analyst finds that unpatched servers have undetected vulnerabilities because the vulnerability scanner does not have the latest set of signatures. Management directed the security team to have personnel update the scanners with the latest signatures at least 24 hours before conducting any scans, but the outcome is unchanged ....
After determining the alert was a true positive, which of the following represents the MOST likely cause?
A cybersecurity analyst has received an alert that well-known “call home” messages are continuously observed by network sensors at the network boundary. The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?A . Attackers are running...
Which of the following is occurring?
After running a packet analyzer on the network, a security analyst has noticed the following output: Which of the following is occurring?A . A ping sweepB . A port scanC . A network mapD . A service discoveryView AnswerAnswer: B
Which of the following scanning topologies is BEST suited for this environment?
A university wants to increase the security posture of its network by implementing vulnerability scans of both centrally managed and student/employee laptops. The solution should be able to scale, provide minimum false positives and high accuracy of results, and be centrally managed through an enterprise console . Which of the...
Which of the following steps should be taken to prevent further disclosure of information about the breach?
Law enforcement has contacted a corporation’s legal counsel because correlated data from a breach shows the organization as the common denominator from all indicators of compromise. An employee overhears the conversation between legal counsel and law enforcement, and then posts a comment about it on social media. The media then...
Which of the following BEST describes the offensive participants in a tabletop exercise?
Which of the following BEST describes the offensive participants in a tabletop exercise?A . Red teamB . Blue teamC . System administratorsD . Security analystsE . Operations teamView AnswerAnswer: A
Which of the following is the BEST way to proceed?
In order to meet regulatory compliance objectives for the storage of PHI, vulnerability scans must be conducted on a continuous basis. The last completed scan of the network returned 5,682 possible vulnerabilities. The Chief Information Officer (CIO) would like to establish a remediation plan to resolve all known issues ....