PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following BEST describes the compromised s…

An administrator is investigating a system that may potentially be compromised, and sees the following log
entries on the router.
*Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5
(6667), 3 packets.
*Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5
(6667), 6 packets.
*Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5
(6667), 8 packets.
Which of the following BEST describes the compromised system?

The security administrator is determining the:

A set of standardized system images with a pre-defined set of applications is used to build end-user
workstations. The security administrator has scanned every workstation to create a current inventory of all
applications that are installed on active workstations and is documenting which applications are out-of-date and
could be exploited. The security administrator is determining the:

Which of the following is the developer performing when…

A software development company has hired a programmer to develop a plug-in module to an existing
proprietary application. After completing the module, the developer needs to test the entire application to ensure
that the module did not introduce new vulnerabilities. Which of the following is the developer performing when
testing the application?


Page 109 of 4,924« First...102030...107108109110111...120130140...Last »