Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following can be used as a vulnerability management and assessment tool?

A.

Nessus

B.

THC Hydra

C.

Cain & Abel

D.

John the Ripper

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

A.

System hardening techniques

B.

System optimization techniques

C.

Defragmentation techniques

D.

Anti-forensic techniques

What allows a company to restore normal business operations in a matter of minutes or seconds?

A.

Cold site

B.

Warm site

C.

Mobile site

D.

Hot site

Which concept involves having more than one person required to complete a task?

A.

Separation of duties

B.

Mandatory access control

C.

Discretionary access control

D.

Least privilege

Detailed step-by-step instructions to follow during a security incident are considered:

A.

Policies

B.

Guidelines

C.

Procedures

D.

Standards

A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an

infection. Which location would be the BEST place for the security professional to find technical information about this malware?

A.

Threat intelligence feeds

B.

Computer emergency response team (CERT) press releases

C.

Vulnerability databases

D.

Social network sites

Recently, a cybersecurity research lab discovered that there is a hacking group focused on hacking into the computers of financial executives in Company A to sell the exfiltrated information to Company B. Which of the

following threat motives does this MOST likely represent?

A.

Desire for power

B.

Association/affiliation

C.

Reputation/recognition

D.

Desire for financial gain

Nmap is a tool most commonly used to:

A.

Map a route for war-driving

B.

Determine who is logged onto a host

C.

Perform network and port scanning

D.

Scan web applications

When attempting to determine which system or user is generating excessive web traffic, analysis of which of

the following would provide the BEST results?

A.

Browser logs

B.

HTTP logs

C.

System logs

D.

Proxy logs

A digital forensics investigation requires analysis of a compromised system's physical memory. Which of the following tools should the forensics analyst use to complete this task?

A.

Autopsy

B.

FTK

C.

Volatility

D.

Wire shark

E.

CAINE