Loading questions...
Updated
An auditor is reviewing the following output from a password-cracking tool:
In which of the following ways does phishing and smishing differ?
A security analyst is determining the point of compromise after a company was hacked. The analyst checks the server logs and sees that a user account was logged in at night, and several large compressed files were exfiltrated. The analyst then discovers the user last logged in four years ago and was terminated.
Which of the following should the security analyst recommend to prevent this type of attack in the future? (Choose two.)
An analysis of a threat actor, which has been active for several years, reveals the threat actor has high levels of funding, motivation, and sophistication. Which of the following types of threat actors does this BEST describe?
Given the following output:
When an initialization vector is added to each encryption cycle, it is using the:
During a routine check, a security analyst discovered the script responsible for the backup of the corporate file server has been changed to the following:
An organization requires three separate factors for authentication to sensitive systems. Which of the following would BEST satisfy the requirement?
A security analyst has been asked to implement secure protocols to prevent cleartext credentials from being transmitted over the internal network. Which of the following protocols is the security analyst MOST likely to implement? (Choose two.)
Buffer overflow can be avoided using proper:
Which of the following systems, if compromised, may cause great danger to the integrity of water supplies and their chemical levels?
Which of the following must be intact for evidence to be admissible in court?
An organization has the following written policies:
✑ Users must request approval for non-standard software installation.
✑ Administrators will perform all software installations.
✑ Software must be installed from a trusted repository.
A recent security audit identified crypto-currency software installed on one user's machine. There are no indications of compromise on this machine. Which of the following is the MOST likely cause of this policy violation and the BEST remediation to prevent a reoccurrence?
Employees receive a benefits enrollment email from the company's human resources department at the beginning of each year. Several users have reported receiving the email but are unable to log in to the website with their usernames and passwords. Users who enter the URL for the human resources website can log in without issue. Which of the following security issues is occurring?
An engineer is configuring a wireless network using PEAP for the authentication protocol. Which of the following is required?
An organization is setting up a satellite office and wishes to extend the corporate network to the new site. Which of the following is the BEST solution to allow the users to access corporate resources while focusing on usability and security?
A NIPS administrator needs to install a new signature to observe the behavior of a worm that may be spreading over SMB. Which of the following signatures should be installed on the NIPS?
Exploitation of a system using widely known credentials and network addresses that results in DoS is an example of:
Which of the following is an example of the second A in the AAA model?
Which of the following threat actors is motivated primarily by a desire for personal recognition and a sense of accomplishment?
A vulnerability scanner that uses its running service's access level to better assess vulnerabilities across multiple assets within an organization is performing a:
An attacker has gained control of several systems on the Internet and is using them to attack a website, causing it to stop responding to legitimate traffic. Which of the following BEST describes the attack?
A company has users and printers in multiple geographic locations, and the printers are located in common areas of the offices. To preserve the confidentiality of
PII, a security administrator needs to implement the appropriate controls. Which of the following would BEST meet the confidentiality requirements of the data?
DRAG DROP -
A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center.
INSTRUCTIONS -
Drag and drop the applicable controls to each asset type.
Controls can be used multiple times and not all placeholders need to be filled.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Select and Place:
Which of the following attacks specifically impact data availability?
Which of the following methods did the auditor MOST likely use?
Which of the following BEST describes the scanned environment?
Which of the following BEST describes the type of malware the analyst discovered?