PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following is the BEST solution to meet the…

A security services company is scoping a proposal with a client. They want to perform a general security audit
of their environment within a two week period and consequently have the following requirements:
Requirement 1 Ensure their server infrastructure operating systems are at their latest patch levels
Requirement 2 Test the behavior between the application and database Requirement 3 Ensure that customer
data can not be exfiltratedWhich of the following is the BEST solution to meet the above requirements?

which of the following layers of the OSI model is the p…

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate
computers are showing an error message on the screen and are unable to communicate with other computers
in the same lab. The network administrator looks at the following output:
SRC MAC SRC IP DST MAC DST IP
00:1D:1F:AB:10:7D 192.168.1.10:2000 15:BE:9F:AB:10:1D 192.168.1.14:1200
05:DD:1F:AB:10:27 192.168.1.10:1000 22:C7:2F:AB:10:A2 192.168.1.15:1300
Given that all the computers in the lab are directly connected to the same switch, and are not using any
virtualization technology, at which of the following layers of the OSI model is the problem occurring?

Which of the following logs and vulnerabilities would M…

A security manager looked at various logs while investigating a recent security breach in the data center from
an external source. Each log below was collected from various security devices compiled from a report through
the company’s security information and event management server.
Logs:
Log 1:
Feb 5 23:55:37.743: %SEC-6-IPACCESSLOGS: list 10 denied 10.2.5.81 3 packets
Log 2:
HTTP://www.company.com/index.php?
user=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaa
Log 3:
Security Error Alert
Event ID 50: The RDP protocol component X.224 detected an error in the protocol stream and has
disconnected the client
Log 4:
Encoder oe = new OracleEncoder ();
String query = “Select user_id FROM user_data WHERE user_name = ` ” + oe.encode ( req.getParameter
(“userID”) ) + ” ` and user_password = ` ” + oe.encode ( req.getParameter(“pwd”) ) +” ` “;
Vulnerabilities
Buffer overflow
SQL injection
ACL
XSS
Which of the following logs and vulnerabilities would MOST likely be related to the security breach? (Select
TWO).


Page 317 of 4,924« First...102030...315316317318319...330340350...Last »