Which of the following tools can help to detect suspicious or unauthorized changes to critical system configuration files?
Network infrastructure has been scanned and the identified issues have been remediated. What is the next step in the vulnerability assessment process?
A government organization responsible for critical infrastructure is being attacked and files on the server been deleted. Which of the following are the most immediate communications that should be made regarding the incident? (Choose two.)
A security administrator needs to review events from different systems located worldwide. Which of the
following is MOST important to ensure that logs can be effectively correlated?
Windows Server 2016 log files can be found in which of the following locations?
When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?
After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
During recovery from an incident, which three options should a company focus on? (Choose three.)
During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?
Which of the following is the BEST way to prevent social engineering attacks?
Which concept involves having more than one person required to complete a task?
What kind of measures and controls are implemented when employees get assigned personal, unique badges when they join the organization, and they remain valid until the employee's last day of work?
How does encryption work to protect information on remote workers' computers?
An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) poisoning clients on the network. The administrator attaches a system to VLAN 12 and uses Wireshark to capture traffic. After
reviewing the capture file, the administrator finds no evidence of ARP poisoning. Which of the following actions should the administrator take next?
Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?
ABC Company uses technical compliance tests to verify that its IT systems are configured according to organizational information security policies, standards, and guidelines. Which two tools and controls can ABC Company use to verify that its IT systems are configured accordingly? (Choose two.)
Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)
A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?
A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST
likely used by the analyst for the initial discovery?
Which of the following tools can be used as an intrusion detection system (IDS)? (Choose three.)
Which part of a proactive approach to system security is responsible for identifying all possible threats to a system to be categorized and analyzed?
Which answer option is a tactic of social engineering in which an attacker engages in an attack performed by phone?
When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?
Which of the following describes United States federal government cybersecurity policies and guidelines?
After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?
Which asset would be the MOST desirable for a financially motivated attacker to obtain from a health insurance company?
Which of the following security best practices should a web developer reference when developing a new web- based application?
Which of the following plans helps IT security staff detect, respond to, and recover from a cyber attack?
Which of the following regulations is most applicable to a public utility provider operating in the United States?
A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following
would be the BEST action to take to plan for this kind of attack in the future?
Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)
Which of the following types of digital evidence is considered the MOST volatile?
Which of the following digital forensic goals is being provided with hashing and time-stamping of the electronic evidence?
Organizations considered “covered entities” are required to adhere to which compliance requirement?
Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?
An organization wants to deploy a network security tool to alert them but not block malicious activity and network traffic. Which of the following tools would BEST meet the organization's needs?
According to Payment Card Industry Data Security Standard (PCI DSS) compliance requirements, an organization must retain logs for what length of time?
Which three answer options are password attack methods and techniques? (Choose three.)
A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?
During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?
Which of the following is a social engineering tactic in which an attacker engages in temptation or promise of a good or service?
An incident responder was asked to analyze malicious traffic. Which of the following tools would be BEST for this?
A digital forensics investigation requires analysis of a compromised system's physical memory. Which of the following tools should the forensics analyst use to complete this task?
When reviewing log files from a recent incident, the response team discovers that most of the network-based indicators are IP-based. It would be helpful to the response team if they could resolve those IP-based indicators to hostnames. Which of the following is BEST suited for this task?
As part of an organization’s regular maintenance activities, a security engineer visits the Internet Storm Center advisory page to obtain the latest list of blacklisted host/network addresses. The security engineer does this to perform which of the following activities?