Full-disk encryption
Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups.
dd
OID
Netstat
RADIUS federation
Resiliency
Elasticity
PEM (Privacy Enhanced Mail)
DDoS (Distributed Denial of Service)
Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?
Competitor
A penetration tester is crawling a target website that is available to the public. Which of the following represents the actions the penetration tester is performing?
Reconnaissance
Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)
*Rainbow tables must include precomputed hashes.
*Rainbow table attacks bypass maximum failed login restrictions.
Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?
Input validation to protect against SQL injection.
A security analyst wishes to increase the security of an FTP server.
Currently, all traffic to the FTP server is unencrypted.
Users connecting to the FTP server use a variety of modern FTP client software.
The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections.
Which of the following would BEST accomplish these goals?
Use explicit FTPS for connections.
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
The recipient can verify integrity of the software patch.
Public class rainbow {
public static void main (String [] args) {
object blue = null ;
blue.hashcode () ; }
}
Which of the following vulnerabilities would occur if this is executed?
Missing null check.
Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened.
The network and security teams perform the following actions: -> Shut down all network shares.
-> Run an email search identifying all employees who received the malicious message.
-> Reimage all devices belonging to users who opened the attachment.
Next, the teams want to re-enable the network shares.
Which of the following BEST describes this phase of the incident response process?
Recovery
An organization has determined it can tolerate a maximum of three hours of downtime.
Which of the following has been specified?
RTO (Recovery Time Objective)
Which of the following types of keys is found in a key escrow?
Private
[] [1:2467:7] EXPLOIT IGMP IGAP message overflow attempt []
[Classification: Attempted Administrator Privilege Gain] [Priority: 1]
07/30-19:45:02.238185 250-19.18.71 -> 250.19.18.22
IGMP TTL:255 TOS: 0x0 ID: 9742 IpLen:20 DgmLen: 502 MF
Frag offset: 0x1FFF Frag Size: 0x01E2
*The source IP of the attack is coming from 250.19.18.71.
*The attacker sent a malformed IGAP packet, triggering the alert.