Which of the following log types would the administrator check?
A security administrator needs to determine which system a particular user is trying to login to at
various times of the day. Which of the following log types would the administrator check?
Which of the following log types would the administrator check?
A security administrator needs to determine which system a particular user is trying to login to at
various times of the day. Which of the following log types would the administrator check?
Which of the following lines in the user’s history log shows evidence that the user attempted to escape the
The security administrator is analyzing a user’s history file on a Unix server to determine if the
user was attempting to break out of a rootjail. Which of the following lines in the user’s history log
shows evidence that the user attempted to escape the rootjail?
Which of the following lines in the user’s history log shows evidence that the user attempted to escape the
The security administrator is analyzing a user’s history file on a Unix server to determine if the
user was attempting to break out of a rootjail. Which of the following lines in the user’s history log
shows evidence that the user attempted to escape the rootjail?
Which of the following actions would BEST accomplish this goal?
A security technician is attempting to improve the overall security posture of an internal mail
server. Which of the following actions would BEST accomplish this goal?
Which of the following should be executed on the router to prevent access via these ports?
A vulnerability assessment indicates that a router can be accessed from default port 80 and
default port 22. Which of the following should be executed on the router to prevent access via
these ports? (Select TWO).
Which of the following should be executed on the router to prevent access via these ports?
A vulnerability assessment indicates that a router can be accessed from default port 80 and
default port 22. Which of the following should be executed on the router to prevent access via
these ports? (Select TWO).
Which of the following should be disabled to mitigate this risk?
During a routine audit a web server is flagged for allowing the use of weak ciphers. Which of the
following should be disabled to mitigate this risk? (Select TWO).
Which of the following should be disabled to mitigate this risk?
During a routine audit a web server is flagged for allowing the use of weak ciphers. Which of the
following should be disabled to mitigate this risk? (Select TWO).
Which of the following services should be disabled to ensure secure communications?
A new web server has been provisioned at a third party hosting provider for processing credit card
transactions. The security administrator runs the netstat command on the server and notices that
ports 80, 443, and 3389 are in a `listening’ state. No other ports are open. Which of the following
services should be disabled to ensure secure communications?