Which of the following BEST describes this type of attack?
An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?
Which of the following is an XML based open standard used in the exchange of authentication and authorization
Which of the following is an XML based open standard used in the exchange of
authentication and authorization information between different parties?
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow i
Which of the following ports and protocol types must be opened on a host with a host-based
firewall to allow incoming SFTP connections?
Which of the following types of malware is on Ann’s workstation?
A user, Ann, is reporting to the company IT support group that her workstation screen is
blank other than a window with a message requesting payment or else her hard drive will be
formatted. Which of the following types of malware is on Ann’s workstation?
Which of the following controls can be implemented together to prevent data loss in the event of theft of a mo
Which of the following controls can be implemented together to prevent data loss in the
event of theft of a mobile device storing sensitive information? (Select TWO).
A way to assure data at-rest is secure even in the event of loss or theft is to usE.
A way to assure data at-rest is secure even in the event of loss or theft is to usE.
Which of the following is occurring?
A security audit identifies a number of large email messages being sent by a specific user
from their company email account to another address external to the company. These
messages were sent prior to a company data breach, which prompted the security audit. The
user was one of a few people who had access to the leaked data. Review of the suspect’s
emails show they consist mostly of pictures of the user at various locations during a recent
vacation. No suspicious activities from other users who have access to the data were
discovered. Which of the following is occurring?
Which of the following protocols was used to access the server remotely?
A security analyst is reviewing firewall logs while investigating a compromised web server.
The following ports appear in the loG.
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
Which of the following software features should be configured on the access points?
An organization does not want the wireless network name to be easily discovered. Which of
the following software features should be configured on the access points?
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines
the computer and finds that a service called Telnet is running and connecting to an external
website over port 443. This Telnet service was found by comparing the system’s services to
the list of standard services on the company’s system image. This review process depends
on: