PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which of the following methods should be used to select the BEST platform?

A company is preparing to upgrade its NIPS at five locations around the world. The three platforms
the team plans to test, claims to have the most advanced features and lucrative pricing.
Assuming all platforms meet the functionality requirements, which of the following methods should
be used to select the BEST platform?

Which of the following will MOST likely reduce the likelihood of similar incidents?

An organization has had component integration related vulnerabilities exploited in consecutive
releases of the software it hosts. The only reason the company was able to identify the
compromises was because of a correlation of slow server performance and an attentive security
analyst noticing unusual outbound network activity from the application servers. End-to-end
management of the development process is the responsibility of the applications development
manager and testing is done by various teams of programmers. Which of the following will MOST
likely reduce the likelihood of similar incidents?

Pattern match "\bunion\b.{1,100}?

An administrator is reviewing logs and sees the following entry:
Message: Access denied with code 403 (phase 2). Pattern match “\bunion\b.{1,100}?\bselect\b” at
ARGS:$id. [data “union all select”] [severity “CRITICAL”] [tag “WEB_ATTACK”] [tag
“WASCTC/WASC-19”] [tag “OWASP_TOP_10/A1”] [tag “OWASP_AppSensor/CIE1”]
Action: Intercepted (phase 2) Apache-Handler: php5-script
Which of the following attacks was being attempted?

Which of the following when implemented would provide the BEST level of protection with the LEAST amount of di

A new startup company with very limited funds wants to protect the organization from external
threats by implementing some type of best practice security controls across a number of hosts
located in the application zone, the production zone, and the core network. The 50 hosts in the
core network are a mixture of Windows and Linux based systems, used by development staff to
develop new applications. The single Windows host in the application zone is used exclusively by

the production team to control software deployments into the production zone. There are 10 UNIX
web application hosts in the production zone which are publically accessible.
Development staff is required to install and remove various types of software from their hosts on a
regular basis while the hosts in the zone rarely require any type of configuration changes.
Which of the following when implemented would provide the BEST level of protection with the
LEAST amount of disruption to staff?