Which of the following attacks initiates a connection by sending specially crafted packets in which multiple TCP
flags are set to 1?
A classroom utilizes workstations running virtualization software for a maximum of one virtual machine per
working station. The network settings on the virtual machines are set to bridged. Which of the following
describes how the switch in the classroom should be configured to allow for the virtual machines and host
workstation to connect to network resources?
Joe, a security analyst, is attempting to determine if a new server meets the security requirements of his
organization. As a step in this process, he attempts to identify a lack of security controls and to identify common
misconfigurations on the server. Which of the following is Joe attempting to complete?
A company is rolling out a new e-commerce website. The security analyst wants to reduce the risk of the new
website being comprised by confirming that system patches are up to date, application hot fixes are current,
and unneeded ports and services have been disabled. To do this, the security analyst will perform a:
A bank Chief Information Security Officer (CISO) is responsible for a mobile banking platform that operates
natively on iOS and Android. Which of the following security controls helps protect the associated publicly
accessible API endpoints?
While responding to an incident on a Linux server, the administrator needs to disable unused services. Which
of the following commands can be used to see processes that are listening on a TCP port?
An administrator is implementing a security control that only permits the execution of allowed programs. Which
of the following are cryptography concepts that should be used to identify the allowed programs? (Choose two.)
A system administrator is configuring a new file server and has been instructed to configure writeable to by the
department manager, and read only for the individual employee.
Which of the following is the name for the access control methodology used?
A router was shut down as a result of a DoS attack. Upon review of the router logs, it was determined that the
attacker was able to connect to the router using a console cable to complete the attack. Which of the following
should have been implemented on the router to prevent this attack? (Choose two)
A company has had several security incidents in the past six months. It appears that the majority of the
incidents occurred on systems with older software on development workstations. Which of the following should
be implemented to help prevent similar incidents in the future?