which of the following attacks should form the basis of the incident mitigation plan?
The root cause analysis of a recent security incident reveals that an attacker accessed a printer
from the Internet. The attacker then accessed the print server, using the printer as a launch pad
for a shell exploit. The print server logs show that the attacker was able to exploit multiple
accounts, ultimately launching a successful DoS attack on the domain controller.
Defending against which of the following attacks should form the basis of the incident mitigation
plan?
Which of the following would MOST likely be defined as a Covered Entity?
Which of the following would MOST likely be defined as a Covered Entity?
Which of the following solutions can be used for antistatic cleaning?
Which of the following solutions can be used for antistatic cleaning?
which weakened the security posture of the enclave?
An existing enterprise architecture included an enclave where sensitive research and development
work was conducted. This network enclave also served as a storage location for proprietary
corporate data and records. The initial security architect chose to protect the enclave by restricting
access to a single physical port on a firewall. All downstream network devices were isolated from
the rest of the network and communicated solely through the single 100mbps firewall port. Over
time, researchers connected devices on the protected enclave directly to external resources and
corporate data stores. Mobile and wireless devices were also added to the enclave to support high
speed data research. Which of the following BEST describes the process which weakened the
security posture of the enclave?
Which of the following would define this agreement?
A patient is about to be administered an anesthetic prior to a surgical procedure. The patient must
sign a document acknowledging the risks involved with anesthesi
a. Which of the following would define this agreement?
which of the following?
At one time, security architecture best practices led to networks with a limited number (1-3) of
network access points. This restriction allowed for the concentration of security resources and
resulted in a well defined attack surface. The introduction of wireless networks, highly portable
network devices, and cloud service providers has rendered the network boundary and attack
surface increasingly porous. This evolution of the security architecture has led to which of the
following?
Which of the following would define this agreement?
A medical facility has signed an agreement with a service provider that guarantees response times to
be within a certain threshold until the term expires. Which of the following would define this
agreement?
Which type of cleaning solution should be used on the exterior of computer components?
Which type of cleaning solution should be used on the exterior of computer components?
Which of the following should be done to prevent further attacks of this nature?
An administrator notices the following file in the Linux server’s /tmp directory.
-rwsr-xr-x. 4 root root 234223 Jun 6 22:52 bash*
Which of the following should be done to prevent further attacks of this nature?
Which of the following ports does the PPTP protocol run on?
Which of the following ports does the PPTP protocol run on?