Which of the following BEST describes this type of attack?
An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?
Which of the following is an XML based open standard used in the exchange of authentication and authorization
Which of the following is an XML based open standard used in the exchange of authentication and
authorization information between different parties?
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow i
Which of the following ports and protocol types must be opened on a host with a host-based
firewall to allow incoming SFTP connections?
Which of the following types of malware is on Ann’s workstation?
A user, Ann, is reporting to the company IT support group that her workstation screen is blank
other than a window with a message requesting payment or else her hard drive will be formatted.
Which of the following types of malware is on Ann’s workstation?
Which of the following controls can be implemented together to prevent data loss in the event of theft of a mo
Which of the following controls can be implemented together to prevent data loss in the event of
theft of a mobile device storing sensitive information? (Select TWO).
A way to assure data at-rest is secure even in the event of loss or theft is to usE
A way to assure data at-rest is secure even in the event of loss or theft is to usE.
Which of the following is occurring?
A security audit identifies a number of large email messages being sent by a specific user from
their company email account to another address external to the company. These messages were
sent prior to a company data breach, which prompted the security audit. The user was one of a
few people who had access to the leaked data. Review of the suspect’s emails show they consist
mostly of pictures of the user at various locations during a recent vacation. No suspicious activities
from other users who have access to the data were discovered.
Which of the following is occurring?
Which of the following protocols was used to access the server remotely?
A security analyst is reviewing firewall logs while investigating a compromised web server. The
following ports appear in the loG.
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
Which of the following software features should be configured on the access points?
An organization does not want the wireless network name to be easily discovered. Which of the
following software features should be configured on the access points?
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the
computer and finds that a service called Telnet is running and connecting to an external website
over port 443. This Telnet service was found by comparing the system’s services to the list of
standard services on the company’s system image. This review process depends on: