Which of the following practices should be implemented …
Ann, the software security engineer, works for a major software vendor. Which of the following practices should be implemented to help prevent race conditions,
buffer overflows, and other similar vulnerabilities prior to each production release?
Which of the following would have BEST kept this incide…
One of the servers on the network stops responding due to lack of available memory. Server administrators did not have a clear definition of what action should
have taken place based on the available memory. Which of the following would have BEST kept this incident from occurring?
Which of the following assessment tools can be used to …
Several users report to the administrator that they are having issues downloading files from the file server. Which of the following assessment tools can be used to
determine if there is an issue with the file server?
Which of the following would a security administrator i…
Which of the following would a security administrator implement in order to identify change from the standard configuration on a server?
Which of the following will MOST likely be performed?
A security specialist has been asked to evaluate a corporate network by performing a vulnerability assessment. Which of the following will MOST likely be
performed?
Which of the following steps should the system administ…
A system administrator has noticed vulnerability on a high impact production server. A recent update was made available by the vendor that addresses the
vulnerability but requires a reboot of the system afterwards. Which of the following steps should the system administrator implement to address the vulnerability?
Which of the following is this an example of?
After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an
enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the
following is this an example of?
Which of the following is the quickest FIRST step towar…
A new security analyst is given the task of determining whether any of the company’s servers are vulnerable to a recently discovered attack on an old version of
SSH. Which of the following is the quickest FIRST step toward determining the version of SSH running on these servers?
Which device monitors network traffic in a passive manner?
Which device monitors network traffic in a passive manner?
Which of the following should be used to complete this task?
Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what services and operating systems are running on the corporate
network. Which of the following should be used to complete this task?