Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

A.

Changing the default password

B.

Updating the device firmware

C.

Setting up new users

D.

Disabling IPv6

E.

Enabling the firewall

An unauthorized network scan may be detected by parsing network sniffer data for:

A.

IP traffic from a single IP address to multiple IP addresses.

B.

IP traffic from a single IP address to a single IP address.

C.

IP traffic from multiple IP addresses to a single IP address.

D.

IP traffic from multiple IP addresses to other networks.

Senior management has stated that antivirus software must be installed on all employee workstations. Which

of the following does this statement BEST describe?

A.

Guideline

B.

Procedure

C.

Policy

D.

Standard

Which of the following attack vectors capitalizes on a previously undisclosed issue with a software application?

A.

Zero-Day Exploit

B.

Brute Force

C.

Misconfiguration

D.

Ransomware

E.

Phishing

The NIST framework 800-137 breaks down the concept of continuous monitoring into which system of tiers?

A.

Tier 1 is information systems, Tier 2 is mission/business processes, and Tier 3 is the organization.

B.

Tier 1 is the organization, Tier 2 is mission/business processes, and Tier 3 is information systems.

C.

Tier 1 is information systems, Tier 2 is the organization, and Tier 3 is mission/business processes.

D.

Tier 1 is the organization, Tier 2 is information systems, and Tier 3 is mission/business processes.

A security analyst needs to capture network traffic from a compromised Mac host. They attempt to execute the tcpdump command using their general user account but continually receive an "Operation Not Permitted" error.

Use of which of the following commands will allow the analyst to capture traffic using tcpdump successfully?

A.

sudo

B.

netstat

C.

chroot

D.

chmod

E.

lsof

While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)

A.

Identifying exposures

B.

Identifying critical assets

C.

Establishing scope

D.

Running scanning tools

E.

Installing antivirus software

An incident responder has collected network capture logs in a text file, separated by five or more data fields.

Which of the following is the BEST command to use if the responder would like to print the file (to terminal/ screen) in numerical order?

A.

cat | tac

B.

more

C.

sort –n

D.

less

Which three tools are used for integrity verification of files? (Choose three.)

A.

sha256sum

B.

ent

C.

pgp32

D.

md5sum

E.

md5deep

A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?

A.

tr -d

B.

uniq -c

C.

wc -m

D.

grep -c