Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When attempting to determine which system or user is generating excessive web traffic, analysis of which of

the following would provide the BEST results?

A.

Browser logs

B.

HTTP logs

C.

System logs

D.

Proxy logs

Full Access
Question # 5

A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use?

A.

nbtstat

B.

WinDump

C.

fport

D.

netstat

Full Access
Question # 6

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

A.

System hardening techniques

B.

System optimization techniques

C.

Defragmentation techniques

D.

Anti-forensic techniques

Full Access
Question # 7

Recently, a cybersecurity research lab discovered that there is a hacking group focused on hacking into the computers of financial executives in Company A to sell the exfiltrated information to Company B. Which of the

following threat motives does this MOST likely represent?

A.

Desire for power

B.

Association/affiliation

C.

Reputation/recognition

D.

Desire for financial gain

Full Access
Question # 8

According to company policy, all accounts with administrator privileges should have suffix _ja. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator’s group. Which of the following actions should the security administrator take?

A.

Review the system log on the affected workstation.

B.

Review the security log on a domain controller.

C.

Review the system log on a domain controller.

D.

Review the security log on the affected workstation.

Full Access
Question # 9

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

A.

Expanding access

B.

Covering tracks

C.

Scanning

D.

Persistence

Full Access
Question # 10

While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with

archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?

A.

cat * | cut –d ‘,’ –f 2,5,7

B.

more * | grep

C.

diff

D.

sort *

Full Access
Question # 11

When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?

A.

DNS cache

B.

ARP cache

C.

CAM table

D.

NAT table

Full Access
Question # 12

A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an

infection. Which location would be the BEST place for the security professional to find technical information about this malware?

A.

Threat intelligence feeds

B.

Computer emergency response team (CERT) press releases

C.

Vulnerability databases

D.

Social network sites

Full Access
Question # 13

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

A.

Stealth scanning

B.

Xmas scanning

C.

FINS scanning

D.

Port scanning

Full Access
Question # 14

It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

A.

Power resources

B.

Network resources

C.

Disk resources

D.

Computing resources

E.

Financial resources

Full Access
Question # 15

Which of the following could be useful to an organization that wants to test its incident response procedures without risking any system downtime?

A.

Blue team exercise

B.

Business continuity exercise

C.

Tabletop exercise

D.

Red team exercise

Full Access