PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following technologies was MOST likely being used to generate this log?

A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: */*
Referrer: http://localhost/
*******
HTTP/1.1 403 Forbidden
Connection: close
Log: Access denied with 403. Pattern matches form bypass
Which of the following technologies was MOST likely being used to generate this log?

Which of the following types of technologies will BEST address this scenario?

Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is
capable of alerting the team when unusual traffic is on the network. Which of the following types of
technologies will BEST address this scenario?

Which of the following risk mitigation strategies is MOST important to the security manager?

The system administrator has deployed updated security controls for the network to limit risk of
attack. The security manager is concerned that controls continue to function as intended to
maintain appropriate security posture. Which of the following risk mitigation strategies is MOST
important to the security manager?